Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 19:03
Behavioral task
behavioral1
Sample
c4210a26cc355b64ed5734df960b2b78.dll
Resource
win7-20240221-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
c4210a26cc355b64ed5734df960b2b78.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
c4210a26cc355b64ed5734df960b2b78.dll
-
Size
209KB
-
MD5
c4210a26cc355b64ed5734df960b2b78
-
SHA1
d0716e4ee39e2caefc5844b35143a4d7e38ae4ec
-
SHA256
838d2f9aa24bb10a81b1d750e116c443100f2be1093fc138e31621fd5911c460
-
SHA512
f000f29368d3c77c14c901573995b05b3b252134af1a16c01e32e1bfb3d35195f1d220f380f7bf887851495c001d3b56dd86895ef608dac9e43f32f0da777f43
-
SSDEEP
6144:T/q32rRjPhKuDkkLjp+ScgBKozpJ1XVSGuRq9M:myR9rIMHZBKI/XV2M
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1064-0-0x0000000000400000-0x0000000000452000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2692 1064 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2000 wrote to memory of 1064 2000 rundll32.exe rundll32.exe PID 2000 wrote to memory of 1064 2000 rundll32.exe rundll32.exe PID 2000 wrote to memory of 1064 2000 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4210a26cc355b64ed5734df960b2b78.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4210a26cc355b64ed5734df960b2b78.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 5683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1064 -ip 10641⤵