Analysis
-
max time kernel
139s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 03:58
Behavioral task
behavioral1
Sample
a19dcf6ba2274042fb134f3129f9b8535d5d0b43fd09c839a151f9d4daf1ef23.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a19dcf6ba2274042fb134f3129f9b8535d5d0b43fd09c839a151f9d4daf1ef23.dll
Resource
win10v2004-20240226-en
General
-
Target
a19dcf6ba2274042fb134f3129f9b8535d5d0b43fd09c839a151f9d4daf1ef23.dll
-
Size
76KB
-
MD5
b4cbb906f65e1f1803b9268165d76c60
-
SHA1
3194739dbb0e879e5d899d7a940e707045eda60c
-
SHA256
a19dcf6ba2274042fb134f3129f9b8535d5d0b43fd09c839a151f9d4daf1ef23
-
SHA512
196fef2fc73497bae713940db2ee464eb97a90a0e0b3022357eaf714d22f7cc1e799f0855007a90397e572147c230dc4b36750f2c5a3513f5f3104fad21bd668
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Zh5:c8y93KQjy7G55riF1cMo03j5
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Processes:
resource yara_rule behavioral2/memory/5012-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/5012-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/5012-3-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2376 5012 WerFault.exe rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 5012 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4740 wrote to memory of 5012 4740 rundll32.exe rundll32.exe PID 4740 wrote to memory of 5012 4740 rundll32.exe rundll32.exe PID 4740 wrote to memory of 5012 4740 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a19dcf6ba2274042fb134f3129f9b8535d5d0b43fd09c839a151f9d4daf1ef23.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a19dcf6ba2274042fb134f3129f9b8535d5d0b43fd09c839a151f9d4daf1ef23.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:5012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 6683⤵
- Program crash
PID:2376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 5012 -ip 50121⤵PID:3076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4472 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:2296