Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
dhl_awb_shipping_invoice_21_05_2024_000000000000024.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
fc3772787eb239ef4d0399680dcc4343
-
SHA1
db2fa99ec967178cd8057a14a428a8439a961a73
-
SHA256
9b93c61c9d63ef8ec80892cc0e4a0877966dca9b0c3eb85555cebd2ddf4d6eed
-
SHA512
79e491ca4591a5da70116114b7fbb66ee15a0532386035e980c9dfe7afb59b1f9d9c758891e25bfb45c36b07afd3e171bac37a86c887387ef0e80b1eaf296c89
-
SSDEEP
192:eS24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OloSl:S8QIl975eXqlWBrz7YLOlo
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 852 2012 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2060 wrote to memory of 2012 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2012 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2012 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2012 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2012 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2012 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2012 2060 rundll32.exe rundll32.exe PID 2012 wrote to memory of 852 2012 rundll32.exe WerFault.exe PID 2012 wrote to memory of 852 2012 rundll32.exe WerFault.exe PID 2012 wrote to memory of 852 2012 rundll32.exe WerFault.exe PID 2012 wrote to memory of 852 2012 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 2243⤵
- Program crash
PID:852
-
-