Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
0f33c9b99144f622bd46336699e96162d67ac8e7c981ccc272a1294959d72739.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0f33c9b99144f622bd46336699e96162d67ac8e7c981ccc272a1294959d72739.dll
Resource
win10v2004-20240508-en
General
-
Target
0f33c9b99144f622bd46336699e96162d67ac8e7c981ccc272a1294959d72739.dll
-
Size
34KB
-
MD5
acd660e04b24efc6ac0ef865f5a7bb8c
-
SHA1
f3844aec3d7803d8d0f5e63dc42255d0951ebfc9
-
SHA256
0f33c9b99144f622bd46336699e96162d67ac8e7c981ccc272a1294959d72739
-
SHA512
1ab5e7025226636aa5f9768213c2e580aa4a8735112382cebdd9676421a54d059de124e748b6da49a287d1783c1080807d4d6a36871fe1232eb2618833ad3a89
-
SSDEEP
768:Fa3YAz56z8nO/iP5ZvPOkrGZNkp01vJNpFsRtjQ:UcwnO/iP5lPOdgWtJxsL
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4656 5072 WerFault.exe 82 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5072 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4988 wrote to memory of 5072 4988 rundll32.exe 82 PID 4988 wrote to memory of 5072 4988 rundll32.exe 82 PID 4988 wrote to memory of 5072 4988 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f33c9b99144f622bd46336699e96162d67ac8e7c981ccc272a1294959d72739.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f33c9b99144f622bd46336699e96162d67ac8e7c981ccc272a1294959d72739.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 8243⤵
- Program crash
PID:4656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5072 -ip 50721⤵PID:4996