Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 23:03
Behavioral task
behavioral1
Sample
6aada779075e7dadd4799bfabeb4ab13f53d2232e33112a2f708aa84c829f4b5.dll
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
6aada779075e7dadd4799bfabeb4ab13f53d2232e33112a2f708aa84c829f4b5.dll
Resource
win10v2004-20240412-en
6 signatures
150 seconds
General
-
Target
6aada779075e7dadd4799bfabeb4ab13f53d2232e33112a2f708aa84c829f4b5.dll
-
Size
76KB
-
MD5
4a0c69abcf5e446ad7d2aa791682fd32
-
SHA1
cacb04b7a8809afc586a26eab74edbeaae7f115a
-
SHA256
6aada779075e7dadd4799bfabeb4ab13f53d2232e33112a2f708aa84c829f4b5
-
SHA512
8c9b9344a04ca1f33865442bfc811add52c7e4e2c65e64c13cbb7466abcd1880a2a01022639a7084b6f0b64cf50683fe993249d49cb59ea6b75a89cea61d9982
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Zjly8Y:c8y93KQjy7G55riF1cMo037Y
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/memory/4872-0-0x0000000010000000-0x0000000010030000-memory.dmp UPX behavioral2/memory/4872-1-0x0000000010000000-0x0000000010030000-memory.dmp UPX -
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral2/memory/4872-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4872-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3028 4872 WerFault.exe 86 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4872 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5028 wrote to memory of 4872 5028 rundll32.exe 86 PID 5028 wrote to memory of 4872 5028 rundll32.exe 86 PID 5028 wrote to memory of 4872 5028 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6aada779075e7dadd4799bfabeb4ab13f53d2232e33112a2f708aa84c829f4b5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6aada779075e7dadd4799bfabeb4ab13f53d2232e33112a2f708aa84c829f4b5.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 7163⤵
- Program crash
PID:3028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4872 -ip 48721⤵PID:3136