Analysis
-
max time kernel
169s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 08:19
Behavioral task
behavioral1
Sample
5f46c6671fc0a4ce2a8f62148ba76b93.dll
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
5f46c6671fc0a4ce2a8f62148ba76b93.dll
-
Size
1.1MB
-
MD5
5f46c6671fc0a4ce2a8f62148ba76b93
-
SHA1
a5a06318aa4d36026ad7e8e242a0cb1ea425cae4
-
SHA256
923cb78fac0f3473f15afabfbccf42bcfa54a80cfd4ca02a36d0516eceea459d
-
SHA512
874c6e047f2b19c77d41fbeda2196a14596cb6ba031ecc744e65f9893de2011626c1e1bd9d74cb79ad36b22018a687f7da2dcbac6cf47ae18934b04705a117e6
-
SSDEEP
24576:viHKy2FieN5CpRni2lpV0ihzjcMf18OI3RSe:vOKy2FieN5CpRdBzjcMf6OI3
Malware Config
Signatures
-
Detect Numando payload 1 IoCs
resource yara_rule behavioral2/memory/3144-1-0x0000000000400000-0x00000000007F8000-memory.dmp family_numando -
resource yara_rule behavioral2/memory/3144-0-0x0000000000400000-0x00000000007F8000-memory.dmp upx behavioral2/memory/3144-1-0x0000000000400000-0x00000000007F8000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2208 3144 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4792 wrote to memory of 3144 4792 rundll32.exe 87 PID 4792 wrote to memory of 3144 4792 rundll32.exe 87 PID 4792 wrote to memory of 3144 4792 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f46c6671fc0a4ce2a8f62148ba76b93.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f46c6671fc0a4ce2a8f62148ba76b93.dll,#12⤵PID:3144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 6963⤵
- Program crash
PID:2208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3144 -ip 31441⤵PID:4852