Analysis
-
max time kernel
12s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 01:10
Behavioral task
behavioral1
Sample
5e5cc4f42c7d5481db280b28d1227568c17ed8cc4208970b7a963a4f30c7cc83.dll
Resource
win7-20230831-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
5e5cc4f42c7d5481db280b28d1227568c17ed8cc4208970b7a963a4f30c7cc83.dll
Resource
win10v2004-20230915-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
5e5cc4f42c7d5481db280b28d1227568c17ed8cc4208970b7a963a4f30c7cc83.dll
-
Size
12.0MB
-
MD5
4bc78fc4c71bac76371b60c3c4821476
-
SHA1
105535d978544d85f8d61d20080905d95e1b35dd
-
SHA256
5e5cc4f42c7d5481db280b28d1227568c17ed8cc4208970b7a963a4f30c7cc83
-
SHA512
58eef4b4c37c0c3d032d71540c8537a19e9c3f95566c1e3f210aaab9fd0420871b0fa19c4e0438d573ac79839e7dc4a9c29a3a565072f72a17079a39cdd9c449
-
SSDEEP
196608:GkznuHSSwHM+AvSaB1HD0fYcSXzgvSJ2RsXx/LVjuMPUwKDbSbp08:s/cAzgvS82LVaKUwAbSbp08
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2564 1780 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1308 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1308 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1780 2160 rundll32.exe 30 PID 2160 wrote to memory of 1780 2160 rundll32.exe 30 PID 2160 wrote to memory of 1780 2160 rundll32.exe 30 PID 2160 wrote to memory of 1780 2160 rundll32.exe 30 PID 2160 wrote to memory of 1780 2160 rundll32.exe 30 PID 2160 wrote to memory of 1780 2160 rundll32.exe 30 PID 2160 wrote to memory of 1780 2160 rundll32.exe 30 PID 1780 wrote to memory of 1308 1780 rundll32.exe 31 PID 1780 wrote to memory of 1308 1780 rundll32.exe 31 PID 1780 wrote to memory of 1308 1780 rundll32.exe 31 PID 1780 wrote to memory of 1308 1780 rundll32.exe 31 PID 1780 wrote to memory of 2564 1780 rundll32.exe 33 PID 1780 wrote to memory of 2564 1780 rundll32.exe 33 PID 1780 wrote to memory of 2564 1780 rundll32.exe 33 PID 1780 wrote to memory of 2564 1780 rundll32.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e5cc4f42c7d5481db280b28d1227568c17ed8cc4208970b7a963a4f30c7cc83.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e5cc4f42c7d5481db280b28d1227568c17ed8cc4208970b7a963a4f30c7cc83.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionExtension "exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 4443⤵
- Program crash
PID:2564
-
-