Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 17:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Fury.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
Fury.dll
Resource
win10v2004-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral3
Sample
Fury.exe
Resource
win7-20240221-en
0 signatures
150 seconds
Behavioral task
behavioral4
Sample
Fury.exe
Resource
win10v2004-20240221-en
0 signatures
150 seconds
General
-
Target
Fury.dll
-
Size
24.2MB
-
MD5
eba0040e4ca554f83d33dc0f0b18c7fe
-
SHA1
51290e1b3c818443fdf9d1ca38eba27184a5e95b
-
SHA256
ff158fde8976b84f0a88eb3097820f746e98429fde57372a0a1a6ecd1d223660
-
SHA512
8ff7e905883f15e5cbcc07940d3640cd3e4e0cae86645a97acc43a9d3272b787c5a154073b87fb2193e7da2d8622226e315c6f89f166abf8e813e04f80861a2c
-
SSDEEP
786432:mUSzR+w9hhQnV6gnKYSp5oQrkFcE++D5:mUSIn8gnvzQrm++D5
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 27 1776 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1776 rundll32.exe 1776 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe 1776 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 1776 212 rundll32.exe 87 PID 212 wrote to memory of 1776 212 rundll32.exe 87 PID 212 wrote to memory of 1776 212 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Fury.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Fury.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1776
-