Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 15:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b729d4805a8ca199ca1a73c2110733a3e3be78b976cd071fa44536d217892f6c.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
b729d4805a8ca199ca1a73c2110733a3e3be78b976cd071fa44536d217892f6c.dll
-
Size
1.1MB
-
MD5
ffaba9a4a4c0c0e42ffb59b320102208
-
SHA1
387659fd8bcd57a38772a78680ccabadd04b546a
-
SHA256
b729d4805a8ca199ca1a73c2110733a3e3be78b976cd071fa44536d217892f6c
-
SHA512
fd96803355e83890cf6c6ad05a784610b9ee4abac37c0e5146bfc0d540031e178ee0da9fc621821450ce491ed265120e9d1d437d742f68aa74cf75bf1a34a82d
-
SSDEEP
24576:OV1F9U0fy/zqruLaRC9FrG0hbAc8EH120MDi6AiAlFoPsdQboDDqXe+7gl/r6X9u:GF9lXKCdcJOfyLKHpa3uK9
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3504 4540 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4508 wrote to memory of 4540 4508 rundll32.exe rundll32.exe PID 4508 wrote to memory of 4540 4508 rundll32.exe rundll32.exe PID 4508 wrote to memory of 4540 4508 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b729d4805a8ca199ca1a73c2110733a3e3be78b976cd071fa44536d217892f6c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b729d4805a8ca199ca1a73c2110733a3e3be78b976cd071fa44536d217892f6c.dll,#12⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 6003⤵
- Program crash
PID:3504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4540 -ip 45401⤵PID:3620