Analysis
-
max time kernel
92s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 23:39
Behavioral task
behavioral1
Sample
1a37e8115a0dacc9018ca4b4ffc5c8a4.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
1a37e8115a0dacc9018ca4b4ffc5c8a4.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
1a37e8115a0dacc9018ca4b4ffc5c8a4.dll
-
Size
5KB
-
MD5
1a37e8115a0dacc9018ca4b4ffc5c8a4
-
SHA1
ca5fc942c6edceecfe02119bc0ab2cec0b1d2f58
-
SHA256
f8e44e4c9c034d14fbaed65a902bb0c60bc954fa0323c412646d0a8c81f1f840
-
SHA512
7dc7d5c23bbd6fa9a15ee86c595cd12f47103932bab68009b75dc11fded1393de5f7cdc6943bb5b079cc7e686b747e46afe571eba30657fee8899f10a0547706
-
SSDEEP
96:TcyyZEk35zFvJk09U736qcXzAfpkCI292vKB2CI+E9fyb:jGHFv+MnKkCWvKB2ffyb
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5080-0-0x0000000010000000-0x0000000010009000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\SysWOW64\\rundll32.exe" rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2564 5080 WerFault.exe 14 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4696 wrote to memory of 5080 4696 rundll32.exe 14 PID 4696 wrote to memory of 5080 4696 rundll32.exe 14 PID 4696 wrote to memory of 5080 4696 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a37e8115a0dacc9018ca4b4ffc5c8a4.dll,#11⤵
- Adds Run key to start application
PID:5080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 6242⤵
- Program crash
PID:2564
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1a37e8115a0dacc9018ca4b4ffc5c8a4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5080 -ip 50801⤵PID:536