Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 02:55
Behavioral task
behavioral1
Sample
1f84492e82a50ba9726ea15d604b20d302ba5cc554a1dfbf5425aff86b5f6cf2.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1f84492e82a50ba9726ea15d604b20d302ba5cc554a1dfbf5425aff86b5f6cf2.dll
Resource
win10v2004-20230220-en
General
-
Target
1f84492e82a50ba9726ea15d604b20d302ba5cc554a1dfbf5425aff86b5f6cf2.dll
-
Size
1.0MB
-
MD5
32cfc98ef7e6d793db75d34964d615a2
-
SHA1
0269a0be8c141cfc2eb0b0aa0d0838528243f254
-
SHA256
1f84492e82a50ba9726ea15d604b20d302ba5cc554a1dfbf5425aff86b5f6cf2
-
SHA512
bf0e33ab3dd88be19f6ac966cdf9a292032fe84d3bd5e47576241a42eebe995e4f30a98e6ed2459435e5cd4242c87b74dcbf6c5f4049c6c5a2b8042bd709d56b
-
SSDEEP
24576:LEu/6TaIRJ2x0tO4xzDMA1jWjBa51Lgp6sXFPdTH7pX7S:LEWgaIRJ2x0tZxHX1751kXLTH7prS
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1836-148-0x0000000003B50000-0x0000000003B86000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1944 1836 WerFault.exe rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 1836 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1724 wrote to memory of 1836 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1836 1724 rundll32.exe rundll32.exe PID 1724 wrote to memory of 1836 1724 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f84492e82a50ba9726ea15d604b20d302ba5cc554a1dfbf5425aff86b5f6cf2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f84492e82a50ba9726ea15d604b20d302ba5cc554a1dfbf5425aff86b5f6cf2.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:1836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 8443⤵
- Program crash
PID:1944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1836 -ip 18361⤵PID:4344