Analysis
-
max time kernel
129s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 01:17
Behavioral task
behavioral1
Sample
9c5cd92b00f105816fb47ec149b4e481517dbb11a321ec809c39d7eed934f06c.dll
Resource
win7-20240508-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
9c5cd92b00f105816fb47ec149b4e481517dbb11a321ec809c39d7eed934f06c.dll
Resource
win10v2004-20240426-en
5 signatures
150 seconds
General
-
Target
9c5cd92b00f105816fb47ec149b4e481517dbb11a321ec809c39d7eed934f06c.dll
-
Size
76KB
-
MD5
930da03c672ba9da1416ca7243c23068
-
SHA1
b9125e04dfd903bc56da7e0de3826110413111cb
-
SHA256
9c5cd92b00f105816fb47ec149b4e481517dbb11a321ec809c39d7eed934f06c
-
SHA512
a6f98aa7ee9b85696c990e7c5bcee0682c121f68d49ed508687db5506de3c6c8c00e228f2acb809ea019cff907f74ff4673a75a2c7a48976d0242b09595b7cb6
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Zy9eQ:c8y93KQjy7G55riF1cMo03c99
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/memory/432-0-0x0000000010000000-0x0000000010030000-memory.dmp UPX behavioral2/memory/432-2-0x0000000010000000-0x0000000010030000-memory.dmp UPX -
resource yara_rule behavioral2/memory/432-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/432-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 436 432 WerFault.exe 84 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 432 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1684 wrote to memory of 432 1684 rundll32.exe 84 PID 1684 wrote to memory of 432 1684 rundll32.exe 84 PID 1684 wrote to memory of 432 1684 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c5cd92b00f105816fb47ec149b4e481517dbb11a321ec809c39d7eed934f06c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c5cd92b00f105816fb47ec149b4e481517dbb11a321ec809c39d7eed934f06c.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 7043⤵
- Program crash
PID:436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 432 -ip 4321⤵PID:2772