Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 12:03
Behavioral task
behavioral1
Sample
unpacked_ursnif.dll
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
unpacked_ursnif.dll
Resource
win10v2004-20230915-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
unpacked_ursnif.dll
-
Size
52KB
-
MD5
a069a2a61eaa75e9440d1c57bc66a902
-
SHA1
0c3ac192ffb1871916e1c520b13057165a1aa888
-
SHA256
9a7b02dce4e5e370cca6b2d51d7e19ee267e87054e50933296ae9c802aba3732
-
SHA512
f7c0a7885ed448ca8b415f3ac4d828c2510122d8ab782e105ddf53e057ea5db324c13489718021271c46244daceceb01e3060cf37a186cf95ced7792eb367dda
-
SSDEEP
768:Riirx/qT2zemt3fhwO8hEUumiw8v/MC2CyTQvnz3NsMe1ZXOTy:RBrx/qizemt3fhMXgvrrvnz3NsMkXOO
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2584 2064 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1936 wrote to memory of 2064 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 2064 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 2064 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 2064 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 2064 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 2064 1936 rundll32.exe rundll32.exe PID 1936 wrote to memory of 2064 1936 rundll32.exe rundll32.exe PID 2064 wrote to memory of 2584 2064 rundll32.exe WerFault.exe PID 2064 wrote to memory of 2584 2064 rundll32.exe WerFault.exe PID 2064 wrote to memory of 2584 2064 rundll32.exe WerFault.exe PID 2064 wrote to memory of 2584 2064 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\unpacked_ursnif.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\unpacked_ursnif.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 1963⤵
- Program crash
PID:2584
-
-