Analysis

  • max time kernel
    1799s
  • max time network
    1111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 08:49

General

  • Target

    $PLUGINSDIR/BgWorker.dll

  • Size

    2KB

  • MD5

    33ec04738007e665059cf40bc0f0c22b

  • SHA1

    4196759a922e333d9b17bda5369f14c33cd5e3bc

  • SHA256

    50f735ab8f3473423e6873d628150bbc0777be7b4f6405247cddf22bb00fb6be

  • SHA512

    2318b01f0c2f2f021a618ca3e6e5c24a94df5d00154766b77160203b8b0a177c8581c7b688ffe69be93a69bc7fd06b8a589844d42447f5060fb4bcf94d8a9aef

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\BgWorker.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\BgWorker.dll,#1
      2⤵
        PID:3144
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 612
          3⤵
          • Program crash
          PID:2900
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3144 -ip 3144
      1⤵
        PID:540
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
        1⤵
          PID:5116
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k UnistackSvcGroup
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2436

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2436-0-0x00000282AAAB0000-0x00000282AAAC0000-memory.dmp
          Filesize

          64KB

        • memory/2436-16-0x00000282AABB0000-0x00000282AABC0000-memory.dmp
          Filesize

          64KB

        • memory/2436-32-0x00000282B2F20000-0x00000282B2F21000-memory.dmp
          Filesize

          4KB

        • memory/2436-34-0x00000282B2F50000-0x00000282B2F51000-memory.dmp
          Filesize

          4KB

        • memory/2436-35-0x00000282B2F50000-0x00000282B2F51000-memory.dmp
          Filesize

          4KB

        • memory/2436-36-0x00000282B3060000-0x00000282B3061000-memory.dmp
          Filesize

          4KB