Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 03:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5.dll
Resource
win7-20230831-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5.dll
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5.dll
-
Size
1.0MB
-
MD5
42f438dcbb8a7c3d046f2cf70c1ad3b9
-
SHA1
a339b5086cec9f226999d0f9eabebf7b1d2723e7
-
SHA256
516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5
-
SHA512
98a9e20f424390444210b628691bb53ae792932b011313b1367087c8745ef1b03a48564e76f17d61a01aa23195498f9f779b5f65f6ccc467606c97681539ca5e
-
SSDEEP
24576:0FDpEW1jX2aGw82ZY4S1+A0Sg+SbfiWhB:KqaTS1WUSphB
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1808-0-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-1-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-2-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-3-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-5-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-7-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-9-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-11-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-13-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-15-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-17-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-19-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-21-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-23-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-25-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-27-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-29-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-31-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-33-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-35-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-37-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-39-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-41-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-43-0x0000000000150000-0x000000000018E000-memory.dmp upx behavioral1/memory/1808-44-0x0000000000150000-0x000000000018E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2792 1808 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1808 rundll32.exe 1808 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1808 2092 rundll32.exe 28 PID 2092 wrote to memory of 1808 2092 rundll32.exe 28 PID 2092 wrote to memory of 1808 2092 rundll32.exe 28 PID 2092 wrote to memory of 1808 2092 rundll32.exe 28 PID 2092 wrote to memory of 1808 2092 rundll32.exe 28 PID 2092 wrote to memory of 1808 2092 rundll32.exe 28 PID 2092 wrote to memory of 1808 2092 rundll32.exe 28 PID 1808 wrote to memory of 2792 1808 rundll32.exe 29 PID 1808 wrote to memory of 2792 1808 rundll32.exe 29 PID 1808 wrote to memory of 2792 1808 rundll32.exe 29 PID 1808 wrote to memory of 2792 1808 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5.dll,#12⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 2923⤵
- Program crash
PID:2792
-
-