Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 07:06
Behavioral task
behavioral1
Sample
98c7afc90f8a8289e8ef1a8c152d3b2d.dll
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
98c7afc90f8a8289e8ef1a8c152d3b2d.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
98c7afc90f8a8289e8ef1a8c152d3b2d.dll
-
Size
173KB
-
MD5
98c7afc90f8a8289e8ef1a8c152d3b2d
-
SHA1
b9f0722eaea123f92eb84251eea53985a168769f
-
SHA256
4c86e253d658c7f25654000a9a03ac06cebbff7d953ca5acbe0ffb1353dfc0ad
-
SHA512
a468f9a962cb9426ecfc5861d6eab21f6bbdee6b2674e16dd1fd790b26036b04e91dd2a606a6828fa25d7f4d1b43d0a77bf4f514072270874d54ee22f1f46444
-
SSDEEP
3072:00ohJjfXbMRLCD+VAk3iWuqCM/Q97/z37CPHb8Vn0U9+5S2l4lBsnW89OU:0P3WmSVxLYMXHb4X9+5Sg4lBsno
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3684-0-0x0000000010000000-0x0000000010086000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3320 3684 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5016 wrote to memory of 3684 5016 rundll32.exe 84 PID 5016 wrote to memory of 3684 5016 rundll32.exe 84 PID 5016 wrote to memory of 3684 5016 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\98c7afc90f8a8289e8ef1a8c152d3b2d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\98c7afc90f8a8289e8ef1a8c152d3b2d.dll,#12⤵PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 6123⤵
- Program crash
PID:3320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3684 -ip 36841⤵PID:4168