Analysis
-
max time kernel
141s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-05-2023 05:21
Behavioral task
behavioral1
Sample
5fa59081c28b1a74728f1d983fcd6dcfe92020acd8c3ce9109d97f594b06524f.dll
Resource
win7-20230220-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5fa59081c28b1a74728f1d983fcd6dcfe92020acd8c3ce9109d97f594b06524f.dll
Resource
win10v2004-20230220-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5fa59081c28b1a74728f1d983fcd6dcfe92020acd8c3ce9109d97f594b06524f.dll
-
Size
232KB
-
MD5
fc7b5a14d80700587745afeed385c31e
-
SHA1
2db40bda7bbf9ba3155769214638e59f525632ca
-
SHA256
5fa59081c28b1a74728f1d983fcd6dcfe92020acd8c3ce9109d97f594b06524f
-
SHA512
6b203c74fa5506dbd96754f1df8455eb35141c478becabaec5a10ce483809e652e7509d0791aedba53b4070973035d6cb620dc07d84bf3b43c1a7f2d67ea2c7d
-
SSDEEP
6144:bS8yCpFdygeZVswjM4nQM9HrW8BA9zS8bk4Q:28yS4VsH4n9HrWiH8o
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2040 2036 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1704 wrote to memory of 2036 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2036 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2036 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2036 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2036 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2036 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 2036 1704 rundll32.exe rundll32.exe PID 2036 wrote to memory of 2040 2036 rundll32.exe WerFault.exe PID 2036 wrote to memory of 2040 2036 rundll32.exe WerFault.exe PID 2036 wrote to memory of 2040 2036 rundll32.exe WerFault.exe PID 2036 wrote to memory of 2040 2036 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5fa59081c28b1a74728f1d983fcd6dcfe92020acd8c3ce9109d97f594b06524f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5fa59081c28b1a74728f1d983fcd6dcfe92020acd8c3ce9109d97f594b06524f.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 2763⤵
- Program crash
PID:2040
-
-