Analysis
-
max time kernel
146s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-06-2023 19:14
Behavioral task
behavioral1
Sample
5b5cf608b31567ae075d092a726d2945dbd14def29c9aeccc96a8b85f8d94c1d.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5b5cf608b31567ae075d092a726d2945dbd14def29c9aeccc96a8b85f8d94c1d.dll
Resource
win10v2004-20230220-en
General
-
Target
5b5cf608b31567ae075d092a726d2945dbd14def29c9aeccc96a8b85f8d94c1d.dll
-
Size
952KB
-
MD5
8a9679ee57fdea6c0358e6d1bf45f45f
-
SHA1
77ea76f3aae239c0711d639b33eca3bd47ab33cf
-
SHA256
5b5cf608b31567ae075d092a726d2945dbd14def29c9aeccc96a8b85f8d94c1d
-
SHA512
e3a0919193cce27d8601671d9d3058933694802937082e9cd3c8f982f4beadd194361770c728f5bf426a526aada33252437cb10afa8a93bb6cf570be0ae37c4e
-
SSDEEP
24576:8yQB/bF1owbwz1fy1UTqW11ZiTARnjgIOpagkxy7Ueg85u:8d9TdW1fy1UTqw1ZCsjCkqG
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1188 888 WerFault.exe rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 888 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1376 wrote to memory of 888 1376 rundll32.exe rundll32.exe PID 1376 wrote to memory of 888 1376 rundll32.exe rundll32.exe PID 1376 wrote to memory of 888 1376 rundll32.exe rundll32.exe PID 1376 wrote to memory of 888 1376 rundll32.exe rundll32.exe PID 1376 wrote to memory of 888 1376 rundll32.exe rundll32.exe PID 1376 wrote to memory of 888 1376 rundll32.exe rundll32.exe PID 1376 wrote to memory of 888 1376 rundll32.exe rundll32.exe PID 888 wrote to memory of 1188 888 rundll32.exe WerFault.exe PID 888 wrote to memory of 1188 888 rundll32.exe WerFault.exe PID 888 wrote to memory of 1188 888 rundll32.exe WerFault.exe PID 888 wrote to memory of 1188 888 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b5cf608b31567ae075d092a726d2945dbd14def29c9aeccc96a8b85f8d94c1d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b5cf608b31567ae075d092a726d2945dbd14def29c9aeccc96a8b85f8d94c1d.dll,#12⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 3243⤵
- Program crash
PID:1188
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/888-54-0x00000000022C0000-0x00000000025F4000-memory.dmpFilesize
3.2MB
-
memory/888-55-0x00000000022C0000-0x00000000025F4000-memory.dmpFilesize
3.2MB
-
memory/888-56-0x00000000022C0000-0x00000000025F4000-memory.dmpFilesize
3.2MB
-
memory/888-57-0x00000000022C0000-0x00000000025F4000-memory.dmpFilesize
3.2MB
-
memory/888-59-0x00000000022C0000-0x00000000025F4000-memory.dmpFilesize
3.2MB
-
memory/888-60-0x00000000022C0000-0x00000000025F4000-memory.dmpFilesize
3.2MB
-
memory/888-61-0x00000000022C0000-0x00000000025F4000-memory.dmpFilesize
3.2MB
-
memory/888-58-0x00000000022C0000-0x00000000025F4000-memory.dmpFilesize
3.2MB
-
memory/888-62-0x00000000022C0000-0x00000000025F4000-memory.dmpFilesize
3.2MB