Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
3856116d8811b91be9c0eb0f8de2e663d97cad8858494111d04d7cb3d2d7aa72.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3856116d8811b91be9c0eb0f8de2e663d97cad8858494111d04d7cb3d2d7aa72.dll
Resource
win10v2004-20231222-en
General
-
Target
3856116d8811b91be9c0eb0f8de2e663d97cad8858494111d04d7cb3d2d7aa72.dll
-
Size
2.2MB
-
MD5
0c12336b8dfaf7d2e50ee17ea930209e
-
SHA1
d9fb613b0563a94aac2e67491980aff4a6dfb47f
-
SHA256
3856116d8811b91be9c0eb0f8de2e663d97cad8858494111d04d7cb3d2d7aa72
-
SHA512
a2de0de86652e16f104efccdf978f636be4cd275834189f2e0c2b5b79037da24c5335ad8f403968ff2d53f4cd5a503a7bb73f4fd68658ec1bc41a4e42574d8f0
-
SSDEEP
24576:GyR3zaE0Bxe1IDIeZTFQWmBjb6Cmur4JTgdt5zjRjkJWQjFNM++UqjP19wNa/laV:TJd0OM5Fym/8RgJWQjFozL19wNa/Wg+
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3200 4072 WerFault.exe 86 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 5028 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2504 wrote to memory of 4072 2504 rundll32.exe 86 PID 2504 wrote to memory of 4072 2504 rundll32.exe 86 PID 2504 wrote to memory of 4072 2504 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3856116d8811b91be9c0eb0f8de2e663d97cad8858494111d04d7cb3d2d7aa72.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3856116d8811b91be9c0eb0f8de2e663d97cad8858494111d04d7cb3d2d7aa72.dll,#12⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 5643⤵
- Program crash
PID:3200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4072 -ip 40721⤵PID:3904
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1828
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5028