Analysis
-
max time kernel
204s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 17:00
Behavioral task
behavioral1
Sample
NEAS.2eef4b05700162c4b8b9f00d8ef7b0d11e1e273219d30130561293bb429f1850.dll
Resource
win7-20231020-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2eef4b05700162c4b8b9f00d8ef7b0d11e1e273219d30130561293bb429f1850.dll
Resource
win10v2004-20231023-en
4 signatures
150 seconds
General
-
Target
NEAS.2eef4b05700162c4b8b9f00d8ef7b0d11e1e273219d30130561293bb429f1850.dll
-
Size
430KB
-
MD5
87150244daf600db0922142d0016af5a
-
SHA1
807a588329837dfd1807dbcfd5c9e1e2b9ffbd3f
-
SHA256
2eef4b05700162c4b8b9f00d8ef7b0d11e1e273219d30130561293bb429f1850
-
SHA512
c6662ca7d3ef22c09785dc75766ca16ec0814338b9ab4a38d1cd4d94ea687a374b73395a41aadee33836faa20f9dafe74f785b559cbcae22e3b4acb07c3f4062
-
SSDEEP
3072:0HDp7pRuKjsir5HZFQGrsUwF7hplPoutjg0QG0+GCPvaDW8:+RR5rhZFQGrsUwF7vlPoSmE6D
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4604-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4604-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4604-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4604-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4604-4-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1680 4604 WerFault.exe 86 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4604 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 4604 3344 rundll32.exe 86 PID 3344 wrote to memory of 4604 3344 rundll32.exe 86 PID 3344 wrote to memory of 4604 3344 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.2eef4b05700162c4b8b9f00d8ef7b0d11e1e273219d30130561293bb429f1850.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.2eef4b05700162c4b8b9f00d8ef7b0d11e1e273219d30130561293bb429f1850.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 6443⤵
- Program crash
PID:1680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4604 -ip 46041⤵PID:784