Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 03:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
47ded890f9937867aa31afe6bda2d66c.dll
Resource
win7-20231215-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
47ded890f9937867aa31afe6bda2d66c.dll
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
47ded890f9937867aa31afe6bda2d66c.dll
-
Size
528KB
-
MD5
47ded890f9937867aa31afe6bda2d66c
-
SHA1
76a14b20830760c4caefafd69a907cefeb0093f9
-
SHA256
16d01f2db892caaa76723644d64768def9b4dc6520b4b4b5455544d4bc4a6409
-
SHA512
01c7e9a8051c9e32a836338ed5a8ec42f812541de756983c456fab2d53732cbf579fdd7d6d1245466e6b17610eef960ffeb94dc02651715e9dbace38a64c694a
-
SSDEEP
12288:gV7LMzw56Wx1Dk/qon6xyYhgPFaUVltwC1UOLMTQi:K1oC3yWgPFzMTQi
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4688 rundll32mgr.exe -
resource yara_rule behavioral2/memory/4688-5-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/4688-7-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process 3964 4688 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 32 wrote to memory of 3676 32 rundll32.exe 14 PID 32 wrote to memory of 3676 32 rundll32.exe 14 PID 32 wrote to memory of 3676 32 rundll32.exe 14 PID 3676 wrote to memory of 4688 3676 rundll32.exe 26 PID 3676 wrote to memory of 4688 3676 rundll32.exe 26 PID 3676 wrote to memory of 4688 3676 rundll32.exe 26
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\47ded890f9937867aa31afe6bda2d66c.dll,#11⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe2⤵
- Executes dropped EXE
PID:4688
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\47ded890f9937867aa31afe6bda2d66c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4688 -ip 46881⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 2721⤵
- Program crash
PID:3964