Analysis
-
max time kernel
141s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 12:11
Behavioral task
behavioral1
Sample
3cd2ef5438c9ddd4c672688bd9adb8b2.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3cd2ef5438c9ddd4c672688bd9adb8b2.dll
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
3cd2ef5438c9ddd4c672688bd9adb8b2.dll
-
Size
922KB
-
MD5
3cd2ef5438c9ddd4c672688bd9adb8b2
-
SHA1
70cec6fb23fbfa670ac5dbbe8cccc5bd1b7974d2
-
SHA256
cb4bd435cfce36e40174e03e27eec800a06387b30d29c7168014b49ca8465875
-
SHA512
672cb3e8b43e01a25c4bcfbaf41f57c0c3e561bbec1e1c5ee59154877c5c0cbd5f8b1bcc9a56fec1374eca56ae304870d9a5a3b9bff4facb86a53be0e3b41ac3
-
SSDEEP
24576:vP5jwBH2cu+74U2avayhcai6ikXt0bw2LJjMJbnGwB:nWBH2Sua9h91tSw2FjMtd
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4276-1-0x0000000002420000-0x00000000026D2000-memory.dmp upx behavioral2/memory/4276-0-0x0000000002420000-0x00000000026D2000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2648 4276 WerFault.exe 15 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2208 wrote to memory of 4276 2208 rundll32.exe 15 PID 2208 wrote to memory of 4276 2208 rundll32.exe 15 PID 2208 wrote to memory of 4276 2208 rundll32.exe 15
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3cd2ef5438c9ddd4c672688bd9adb8b2.dll,#11⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 6202⤵
- Program crash
PID:2648
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3cd2ef5438c9ddd4c672688bd9adb8b2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4276 -ip 42761⤵PID:1264