Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
6889adc5ad025fd7d87df2471b0af649.dll
Resource
win7-20231129-en
General
-
Target
6889adc5ad025fd7d87df2471b0af649.dll
-
Size
184KB
-
MD5
6889adc5ad025fd7d87df2471b0af649
-
SHA1
cdd5b28d6e11a467648a723dc493384ee28d2186
-
SHA256
46f6f3d642c24915a198afc854c75b61fdd502af2a8719224efbb6eb18fdb335
-
SHA512
6e9938cf27bc21be4b30e2339545ef715cb4091d4d60ea2f033e01b552294cd8f6e8289391f81f0c70bad533d0fa6dcf5bae3631ff6fca9f8650cdb951b5fc40
-
SSDEEP
3072:EwHlOS2xtVutM0DGHZpvs7VBUrmVv+uhulMCs2haEp:EwFItpzHTY6rmVv9UGHy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2384 rundll32mgr.exe -
Loads dropped DLL 4 IoCs
pid Process 2952 rundll32.exe 2952 rundll32.exe 2384 rundll32mgr.exe 2384 rundll32mgr.exe -
resource yara_rule behavioral1/memory/2384-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2384-10-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2408 2384 WerFault.exe 16 2824 2952 WerFault.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2952 2884 rundll32.exe 19 PID 2884 wrote to memory of 2952 2884 rundll32.exe 19 PID 2884 wrote to memory of 2952 2884 rundll32.exe 19 PID 2884 wrote to memory of 2952 2884 rundll32.exe 19 PID 2884 wrote to memory of 2952 2884 rundll32.exe 19 PID 2884 wrote to memory of 2952 2884 rundll32.exe 19 PID 2884 wrote to memory of 2952 2884 rundll32.exe 19 PID 2952 wrote to memory of 2384 2952 rundll32.exe 16 PID 2952 wrote to memory of 2384 2952 rundll32.exe 16 PID 2952 wrote to memory of 2384 2952 rundll32.exe 16 PID 2952 wrote to memory of 2384 2952 rundll32.exe 16 PID 2952 wrote to memory of 2824 2952 rundll32.exe 18 PID 2952 wrote to memory of 2824 2952 rundll32.exe 18 PID 2952 wrote to memory of 2824 2952 rundll32.exe 18 PID 2952 wrote to memory of 2824 2952 rundll32.exe 18
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6889adc5ad025fd7d87df2471b0af649.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6889adc5ad025fd7d87df2471b0af649.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2952
-
-
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 1802⤵
- Program crash
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 2481⤵
- Program crash
PID:2824
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD56908cbf48912eb2fa758063d2e137826
SHA1cf667f043d3c6230a94efe0505993897e70e9853
SHA2564875bba3fac9c6c7da089e006a92d337a88de409d5d77be27c96d3f4f48aaf03
SHA5121bbe65397c20427799c77ad1be11acc4424f187f75cf2bb17753169f991235e478db3183802673ec6dd8428a91e04c852fa2321ad786ccd1722899fcf68f67b8
-
Filesize
42KB
MD551bea73984f9683c3818f04cabc3385b
SHA1367de6f736b89cc9044f5cbd14f9d5c7fb11f0f2
SHA256abee7a72fc45151b1aadd1ac9deb4edc81fc274e8a39ac3f7fa5cdda17b358a8
SHA512b13190779609253492d076b5f238cc461d9b92b534fe02f461c9feb2d44c3a50c3b652dcd69978c984b27d31b82fbcb3214078562f615f87a0e4b6ade496142a
-
Filesize
39KB
MD5b5dd49ee311cf82befc626da62bcac60
SHA17e82907622da81699ecf2dc5b5d4ffea8a0e8d83
SHA25667a168497985506ab0a90601cf02493eb5e3f85c35c6b5db671844d336aa064a
SHA512467a5b6af8eb59974fdd055575f71311eaca7dda62742371811cc60277cd5752d3c81058e1cb60f5279484fcbfa68d1e8664845e3de492defcbe92020251fa59
-
Filesize
2KB
MD52729a72acaa3c682884a9e089a85f6e7
SHA17f53c8d9a79788cd10075e87544934abadf69ad3
SHA256edaa4678d4c6faae57fe9b2e89e49b1ce45d59e2be62828d5a540d5ae3e43770
SHA512461a43c378ffa63bff864daf3d63be8febe98c1d361a099b36cdfac10f9077a969d37cb54bcc500249975bc710e1879c37ba29af219d99b77d16c5cf1ef3fd71
-
Filesize
36KB
MD531f709686fd8b42c4ccf5fbb82233b34
SHA106772f474296f19118a500fc74a982140094dbf4
SHA256d22704094a3edc0497212c1014f19f640169ea3b859e733dc9d5ea03558652f1
SHA512b2ae2e2e253550edf853ab49d1e7d8d8542e67add3aca65d8df8fa61253612cd41ee45b8153085a5feedc99d756c0de4f2b4da59091151587589ddd0c1cf1ea2
-
Filesize
5KB
MD5279c3df522ccbe2f50c5a54b2925dc29
SHA1df69ac88d83e404490369504daa4b76e256525f8
SHA2568daa74b3b3ee78f27cef5693d1aee97b26efa85be2818887e4da05a9e68db33b
SHA512ff57bbe59e9d244c94fc05d7578763195c8ab80732d2d40cbe0309e43fa2048167d967c7ceb3e90d92e1da2eff8666d7f46ca0d55b2dd59f91996643957b4095