Analysis
-
max time kernel
96s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 20:37
Behavioral task
behavioral1
Sample
3bc610a48440813062bd6f337a642029.dll
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
3bc610a48440813062bd6f337a642029.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
3bc610a48440813062bd6f337a642029.dll
-
Size
202KB
-
MD5
3bc610a48440813062bd6f337a642029
-
SHA1
a69d0d4563104c14297ea019386411ea21ab26ad
-
SHA256
57ce34295179e4d1891f862be8df3d070a1c81fef744205be99a57163799b419
-
SHA512
22339308899185c8edc62a5e0a9ea1d228504be6ce79b46090295dafa2f2291d86018218031ab50eb2cdc3b304019e6b8696e2f254652b95ec2528f5f413b4f1
-
SSDEEP
6144:/htEuP+8p6NlGRK5eeTJ6+SPKCivOKgCYSwZqfe:/htN9p45ee8+SPkOKgCWqW
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2760-0-0x0000000010000000-0x000000001004F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4856 2760 WerFault.exe 15 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3096 wrote to memory of 2760 3096 rundll32.exe 15 PID 3096 wrote to memory of 2760 3096 rundll32.exe 15 PID 3096 wrote to memory of 2760 3096 rundll32.exe 15
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3bc610a48440813062bd6f337a642029.dll,#11⤵PID:2760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 5682⤵
- Program crash
PID:4856
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3bc610a48440813062bd6f337a642029.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2760 -ip 27601⤵PID:1464