Analysis
-
max time kernel
91s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 09:50
Behavioral task
behavioral1
Sample
b11ca3afb312497def62137c155fce087b6085354f5751ea41dba15a4c0e8236.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
b11ca3afb312497def62137c155fce087b6085354f5751ea41dba15a4c0e8236.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
b11ca3afb312497def62137c155fce087b6085354f5751ea41dba15a4c0e8236.dll
-
Size
884KB
-
MD5
b6cecaa9ef25334052e5c1816368f08d
-
SHA1
6531c3d31b9cc638aa1f471b1c1215124eda01c5
-
SHA256
9818c22145ce8ad52f9bf59a5f82947f21b98aff32e18db26caa37706274109d
-
SHA512
9dd1c59b0503cc0cf8d5510b2acab112fbd7134bae2502563d40ce9041b979309fac6207c08f50ae6a34adfbd066d7e1ac3254281476b5082b204098bce2f330
-
SSDEEP
6144:/qMmee6ICfPQAX5/6HVtDA6ZZ61S5CkxLsA6HeQy3RVcPIiz543K9Hkfu:iMSbCfIHkUs1SFxLshHAIG3Amu
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4328-0-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/4328-2-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral2/memory/4328-1-0x0000000010000000-0x0000000010038000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4716 4328 WerFault.exe 14 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4328 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4072 wrote to memory of 4328 4072 rundll32.exe 14 PID 4072 wrote to memory of 4328 4072 rundll32.exe 14 PID 4072 wrote to memory of 4328 4072 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b11ca3afb312497def62137c155fce087b6085354f5751ea41dba15a4c0e8236.dll,#11⤵
- Suspicious use of SetWindowsHookEx
PID:4328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 6442⤵
- Program crash
PID:4716
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b11ca3afb312497def62137c155fce087b6085354f5751ea41dba15a4c0e8236.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4328 -ip 43281⤵PID:4924