Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 12:13
Behavioral task
behavioral1
Sample
1d71d1db0e6060ef6075baa151eff4b2.dll
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1d71d1db0e6060ef6075baa151eff4b2.dll
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
1d71d1db0e6060ef6075baa151eff4b2.dll
-
Size
33KB
-
MD5
1d71d1db0e6060ef6075baa151eff4b2
-
SHA1
45461cca2a82cb385baf6d7be98b2227948cd7b5
-
SHA256
7acce1b0a140814518fb6009806e796a33ed3dca4706ee3ca7ea9872e32ea3b4
-
SHA512
5a59b53807cb9e6027bf6e5a2e117db5fd6605c0dc0d131cd750c1bd3c6cf3359aa1d8614ea4fda6d72de8880c33e51fe9a597b7acf1569d77afa4cc53085056
-
SSDEEP
768:qmLbJeMCRIi6lnjFf9R8A88TagTW3WsH:qmperR1UnR8AJ2gTWGM
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2484-0-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3604 2484 WerFault.exe 14 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3452 wrote to memory of 2484 3452 rundll32.exe 14 PID 3452 wrote to memory of 2484 3452 rundll32.exe 14 PID 3452 wrote to memory of 2484 3452 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d71d1db0e6060ef6075baa151eff4b2.dll,#11⤵PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 5882⤵
- Program crash
PID:3604
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1d71d1db0e6060ef6075baa151eff4b2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2484 -ip 24841⤵PID:4732