Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 15:18
Behavioral task
behavioral1
Sample
JC_700001e5088408447fceb6faf46e45948f3efe15b409a011d5e9e5ed969be8e9.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_700001e5088408447fceb6faf46e45948f3efe15b409a011d5e9e5ed969be8e9.dll
Resource
win10v2004-20230915-en
General
-
Target
JC_700001e5088408447fceb6faf46e45948f3efe15b409a011d5e9e5ed969be8e9.dll
-
Size
208KB
-
MD5
fafa46dd9fed5f3992c6afc5625cad21
-
SHA1
321351e76b90d4ec6695601ae721caa232b8bfc4
-
SHA256
700001e5088408447fceb6faf46e45948f3efe15b409a011d5e9e5ed969be8e9
-
SHA512
6a4cab152a38f8db8cb4ee026ed50097dd397170e24abb5383793e3e4857a1225a08be26105ccddb52da72e68745c6bb3505d85f10b8e190f3eea14f4244ea96
-
SSDEEP
3072:LI6CqRCxffkClZ8Ccn7LQlRw6x+Y3CxT2DtK5jdU6Y5M:LIDff9D8C6XYRw6MT2DEj
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1700 1948 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2152 wrote to memory of 1948 2152 rundll32.exe rundll32.exe PID 2152 wrote to memory of 1948 2152 rundll32.exe rundll32.exe PID 2152 wrote to memory of 1948 2152 rundll32.exe rundll32.exe PID 2152 wrote to memory of 1948 2152 rundll32.exe rundll32.exe PID 2152 wrote to memory of 1948 2152 rundll32.exe rundll32.exe PID 2152 wrote to memory of 1948 2152 rundll32.exe rundll32.exe PID 2152 wrote to memory of 1948 2152 rundll32.exe rundll32.exe PID 1948 wrote to memory of 1700 1948 rundll32.exe WerFault.exe PID 1948 wrote to memory of 1700 1948 rundll32.exe WerFault.exe PID 1948 wrote to memory of 1700 1948 rundll32.exe WerFault.exe PID 1948 wrote to memory of 1700 1948 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JC_700001e5088408447fceb6faf46e45948f3efe15b409a011d5e9e5ed969be8e9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JC_700001e5088408447fceb6faf46e45948f3efe15b409a011d5e9e5ed969be8e9.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 2323⤵
- Program crash
PID:1700
-
-