Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:56
Behavioral task
behavioral1
Sample
98d1a02a1eb441837422e202ff1ae80a67214cd2a9f9c69a3c531976fc7053f6.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
98d1a02a1eb441837422e202ff1ae80a67214cd2a9f9c69a3c531976fc7053f6.dll
Resource
win10v2004-20240426-en
General
-
Target
98d1a02a1eb441837422e202ff1ae80a67214cd2a9f9c69a3c531976fc7053f6.dll
-
Size
76KB
-
MD5
527aa9bc06168c51cc43ea7327dcc1ec
-
SHA1
36830281eedd4f108f336b69accabe6224794c88
-
SHA256
98d1a02a1eb441837422e202ff1ae80a67214cd2a9f9c69a3c531976fc7053f6
-
SHA512
cd1627ccc481d01af8804e1723ac15f9a1b81f050dc683c250511095ffe327c363d1b7c4c27d47d0fe5c7dc9aa276984fe5d26f85a4741b95e0d8e48797160ad
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Ze4ZSc9JBE:c8y93KQjy7G55riF1cMo03AqSc/q
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2200-1-0x0000000010000000-0x0000000010030000-memory.dmp UPX behavioral1/memory/2200-0-0x0000000010000000-0x0000000010030000-memory.dmp UPX behavioral1/memory/2200-2-0x0000000010000000-0x0000000010030000-memory.dmp UPX -
Processes:
resource yara_rule behavioral1/memory/2200-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2200-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2200-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2604 2200 WerFault.exe rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 2200 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3052 wrote to memory of 2200 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2200 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2200 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2200 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2200 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2200 3052 rundll32.exe rundll32.exe PID 3052 wrote to memory of 2200 3052 rundll32.exe rundll32.exe PID 2200 wrote to memory of 2604 2200 rundll32.exe WerFault.exe PID 2200 wrote to memory of 2604 2200 rundll32.exe WerFault.exe PID 2200 wrote to memory of 2604 2200 rundll32.exe WerFault.exe PID 2200 wrote to memory of 2604 2200 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\98d1a02a1eb441837422e202ff1ae80a67214cd2a9f9c69a3c531976fc7053f6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\98d1a02a1eb441837422e202ff1ae80a67214cd2a9f9c69a3c531976fc7053f6.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 3283⤵
- Program crash
PID:2604