Analysis
-
max time kernel
137s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 10:16
Behavioral task
behavioral1
Sample
5f46c6671fc0a4ce2a8f62148ba76b93.dll
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
5f46c6671fc0a4ce2a8f62148ba76b93.dll
-
Size
1.1MB
-
MD5
5f46c6671fc0a4ce2a8f62148ba76b93
-
SHA1
a5a06318aa4d36026ad7e8e242a0cb1ea425cae4
-
SHA256
923cb78fac0f3473f15afabfbccf42bcfa54a80cfd4ca02a36d0516eceea459d
-
SHA512
874c6e047f2b19c77d41fbeda2196a14596cb6ba031ecc744e65f9893de2011626c1e1bd9d74cb79ad36b22018a687f7da2dcbac6cf47ae18934b04705a117e6
-
SSDEEP
24576:viHKy2FieN5CpRni2lpV0ihzjcMf18OI3RSe:vOKy2FieN5CpRdBzjcMf6OI3
Malware Config
Signatures
-
Detect Numando payload 2 IoCs
resource yara_rule behavioral2/memory/4448-2-0x0000000002340000-0x0000000002738000-memory.dmp family_numando behavioral2/memory/4448-3-0x0000000002340000-0x0000000002738000-memory.dmp family_numando -
resource yara_rule behavioral2/memory/4448-0-0x0000000002340000-0x0000000002738000-memory.dmp upx behavioral2/memory/4448-1-0x0000000002340000-0x0000000002738000-memory.dmp upx behavioral2/memory/4448-2-0x0000000002340000-0x0000000002738000-memory.dmp upx behavioral2/memory/4448-3-0x0000000002340000-0x0000000002738000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2588 4448 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1972 wrote to memory of 4448 1972 rundll32.exe 91 PID 1972 wrote to memory of 4448 1972 rundll32.exe 91 PID 1972 wrote to memory of 4448 1972 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f46c6671fc0a4ce2a8f62148ba76b93.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5f46c6671fc0a4ce2a8f62148ba76b93.dll,#12⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 6963⤵
- Program crash
PID:2588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4448 -ip 44481⤵PID:1476