Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 01:51
Behavioral task
behavioral1
Sample
57627c2c58e3ce46034a0b6bcf883dfd.dll
Resource
win7-20231129-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
57627c2c58e3ce46034a0b6bcf883dfd.dll
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
57627c2c58e3ce46034a0b6bcf883dfd.dll
-
Size
208KB
-
MD5
57627c2c58e3ce46034a0b6bcf883dfd
-
SHA1
b6e559bb6e257ff49610c4a7d52a29951cd60a1a
-
SHA256
c78f8fff4bee78adb3b26c506afd2b11e6ab8a3c149ecf20110a3785ec306c12
-
SHA512
5fe076df91244cefa9cfa7288304a317a108e8fc294794c06735165dfcb2fec78edb508ee4c6481b99702791dc560a4fd067c1a8d64b3c673d9c43778e02d9bb
-
SSDEEP
6144:W6DkXc/suqachf1GC5sOeO9ELVnhiEuhGQWEYBkriyloS:WP6IacTGC50hijhGQWEOkrimoS
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4780-1-0x00000000007E0000-0x0000000000846000-memory.dmp upx behavioral2/memory/4780-0-0x00000000007E0000-0x0000000000846000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1860 4780 WerFault.exe 87 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3428 wrote to memory of 4780 3428 rundll32.exe 87 PID 3428 wrote to memory of 4780 3428 rundll32.exe 87 PID 3428 wrote to memory of 4780 3428 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57627c2c58e3ce46034a0b6bcf883dfd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\57627c2c58e3ce46034a0b6bcf883dfd.dll,#12⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 5443⤵
- Program crash
PID:1860
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4780 -ip 47801⤵PID:856