Analysis
-
max time kernel
134s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
12164da7609f0f92f2959bc0b1bba80de170c9ae1bde20d11334766bce089308.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
12164da7609f0f92f2959bc0b1bba80de170c9ae1bde20d11334766bce089308.dll
Resource
win10v2004-20240426-en
General
-
Target
12164da7609f0f92f2959bc0b1bba80de170c9ae1bde20d11334766bce089308.dll
-
Size
3.8MB
-
MD5
2c0d7097828e0e86ae199d8a972d4743
-
SHA1
cd360f2888f95f37c6886de65f143783773f4d64
-
SHA256
12164da7609f0f92f2959bc0b1bba80de170c9ae1bde20d11334766bce089308
-
SHA512
d4e68d14cd246381374aea68e6028699a95861b41e77c65f66c75c78227ddf7e34139fa6f3c7ca4b8c727cf1593f31026fd475c30d576599040e1ea3f9011143
-
SSDEEP
24576:SNXIZH36nxg1A1IrhnlH/PigikmCORHOp5:UXutA1IFlHrzORW5
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral2/memory/3008-4-0x0000000010000000-0x00000000103D9000-memory.dmp UPX behavioral2/memory/3128-6-0x0000000000400000-0x0000000000454000-memory.dmp UPX behavioral2/files/0x0007000000023297-3.dat UPX behavioral2/memory/3008-8-0x0000000010000000-0x00000000103D9000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 3128 rundll32mgr.exe -
resource yara_rule behavioral2/memory/3128-6-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/files/0x0007000000023297-3.dat upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4728 3008 WerFault.exe 82 5008 3128 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4336 wrote to memory of 3008 4336 rundll32.exe 82 PID 4336 wrote to memory of 3008 4336 rundll32.exe 82 PID 4336 wrote to memory of 3008 4336 rundll32.exe 82 PID 3008 wrote to memory of 3128 3008 rundll32.exe 83 PID 3008 wrote to memory of 3128 3008 rundll32.exe 83 PID 3008 wrote to memory of 3128 3008 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12164da7609f0f92f2959bc0b1bba80de170c9ae1bde20d11334766bce089308.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12164da7609f0f92f2959bc0b1bba80de170c9ae1bde20d11334766bce089308.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:3128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 2684⤵
- Program crash
PID:5008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 6843⤵
- Program crash
PID:4728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3008 -ip 30081⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3128 -ip 31281⤵PID:4896
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5f3873258a4258a6761dc54d47463182f
SHA1fbbf8bca739ca4e9745e5224662b33b437a52461
SHA25663b02a3e8e7e049d1f29cd4cd79fe5c8905754da6c023df72aa5cca351d0d5c5
SHA512eec16bb41fd05d9acd5d2b17eb5218057c3cd97cd706e0782a64eb2c32f8a57f1206fe0268be7f37a9f1c3f7b8eb09767cf2724951eaee4be03c4d509d4b3dd4