Analysis
-
max time kernel
98s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2023 01:18
Behavioral task
behavioral1
Sample
69b56675f6d18ccb505abbc549a25d3e772a58c6ed6ce9ba204cad87e6700558.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
69b56675f6d18ccb505abbc549a25d3e772a58c6ed6ce9ba204cad87e6700558.dll
Resource
win10v2004-20230220-en
General
-
Target
69b56675f6d18ccb505abbc549a25d3e772a58c6ed6ce9ba204cad87e6700558.dll
-
Size
466KB
-
MD5
532168c98146e5cc826971f92b5d53ab
-
SHA1
659014832d3ad08ccf57e494d642821e34624805
-
SHA256
69b56675f6d18ccb505abbc549a25d3e772a58c6ed6ce9ba204cad87e6700558
-
SHA512
a056ac2a6f84328c68143604bbc2e5f5d02ca87b513356e507674defa5212f8f21e434989056b4a9ab1e4c9e69c6ec1ce4acfa0172e81303c530841287b62632
-
SSDEEP
12288:grVHy/Suu10Mbge5QZrmAwBJi3GS4ReUBTz:gxHku10Mce6ZrOBJiee0X
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3868 4448 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1664 wrote to memory of 4448 1664 rundll32.exe rundll32.exe PID 1664 wrote to memory of 4448 1664 rundll32.exe rundll32.exe PID 1664 wrote to memory of 4448 1664 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69b56675f6d18ccb505abbc549a25d3e772a58c6ed6ce9ba204cad87e6700558.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69b56675f6d18ccb505abbc549a25d3e772a58c6ed6ce9ba204cad87e6700558.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 6883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4448 -ip 44481⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4448-134-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB
-
memory/4448-133-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB
-
memory/4448-135-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB
-
memory/4448-136-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB
-
memory/4448-137-0x0000000000400000-0x0000000000534000-memory.dmpFilesize
1.2MB