Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 03:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5.dll
Resource
win7-20230831-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5.dll
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5.dll
-
Size
1.0MB
-
MD5
42f438dcbb8a7c3d046f2cf70c1ad3b9
-
SHA1
a339b5086cec9f226999d0f9eabebf7b1d2723e7
-
SHA256
516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5
-
SHA512
98a9e20f424390444210b628691bb53ae792932b011313b1367087c8745ef1b03a48564e76f17d61a01aa23195498f9f779b5f65f6ccc467606c97681539ca5e
-
SSDEEP
24576:0FDpEW1jX2aGw82ZY4S1+A0Sg+SbfiWhB:KqaTS1WUSphB
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2144-1-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-0-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-2-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-3-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-5-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-7-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-9-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-11-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-13-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-15-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-17-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-19-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-21-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-23-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-25-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-27-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-29-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-31-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-33-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-35-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-37-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-39-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-41-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-43-0x0000000003000000-0x000000000303E000-memory.dmp upx behavioral2/memory/2144-44-0x0000000003000000-0x000000000303E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3608 2144 WerFault.exe 85 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2144 rundll32.exe 2144 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4896 wrote to memory of 2144 4896 rundll32.exe 85 PID 4896 wrote to memory of 2144 4896 rundll32.exe 85 PID 4896 wrote to memory of 2144 4896 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\516d9fb7cd9d28d54bd6d18e0b8a5a0c86cb7869753a822a34051cb4c3e214f5.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 7123⤵
- Program crash
PID:3608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2144 -ip 21441⤵PID:4936