Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 05:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
48352868edb6ead5c71454bbcb8b5496.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
48352868edb6ead5c71454bbcb8b5496.dll
Resource
win10v2004-20231222-en
0 signatures
150 seconds
General
-
Target
48352868edb6ead5c71454bbcb8b5496.dll
-
Size
45KB
-
MD5
48352868edb6ead5c71454bbcb8b5496
-
SHA1
e9666038da7cdd1f5909a871c59fa802175ef8e6
-
SHA256
0c205ce7bc123eea1dfeb7137348876e21fafe7fcd677e3a1547af59daaa1377
-
SHA512
936b9ca845ec949e6d88fc59209ed2893017601c077cb7601fd4abc8e0131d7003cb27fa25f95ccf9a99346ddebf61ffa077d7c5568fcb59fd4882823e9ae798
-
SSDEEP
768:ZGvNd8/fRaL6E0RfoHsQK+hd48JkLovIV8/QibUZYqMnCLN+Zud5O3uaKCuWLykw:Z8PII6CsQzd48JkLoIVLibUZYyN+Z4kd
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process 2516 2312 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2312 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2312 2800 rundll32.exe 15 PID 2800 wrote to memory of 2312 2800 rundll32.exe 15 PID 2800 wrote to memory of 2312 2800 rundll32.exe 15 PID 2800 wrote to memory of 2312 2800 rundll32.exe 15 PID 2800 wrote to memory of 2312 2800 rundll32.exe 15 PID 2800 wrote to memory of 2312 2800 rundll32.exe 15 PID 2800 wrote to memory of 2312 2800 rundll32.exe 15 PID 2312 wrote to memory of 2516 2312 rundll32.exe 14 PID 2312 wrote to memory of 2516 2312 rundll32.exe 14 PID 2312 wrote to memory of 2516 2312 rundll32.exe 14 PID 2312 wrote to memory of 2516 2312 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 2401⤵
- Program crash
PID:2516
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48352868edb6ead5c71454bbcb8b5496.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\48352868edb6ead5c71454bbcb8b5496.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2800