Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 21:21
Behavioral task
behavioral1
Sample
3ed5cc39fcf5946cfd1356ea656bbbdfebbb1fb7fe48aecd523bab9fc8fd355a.dll
Resource
win7-20240508-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
3ed5cc39fcf5946cfd1356ea656bbbdfebbb1fb7fe48aecd523bab9fc8fd355a.dll
Resource
win10v2004-20240508-en
6 signatures
150 seconds
General
-
Target
3ed5cc39fcf5946cfd1356ea656bbbdfebbb1fb7fe48aecd523bab9fc8fd355a.dll
-
Size
76KB
-
MD5
3d00c44045e688be1c79c04e0e8ee821
-
SHA1
290ddad9b372a339f5d79dc8a3e0a7281a223702
-
SHA256
3ed5cc39fcf5946cfd1356ea656bbbdfebbb1fb7fe48aecd523bab9fc8fd355a
-
SHA512
a3fcbf2a776ad7b480dc535c09c5d0877f11d8ad9d966317638c8b13d3fb359a71dfb3aaea1404b8ea2603d924dfede6eb29c9cba1713049d51a25cfa502bd49
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Z65jV94K:c8y93KQjy7G55riF1cMo03+v
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/memory/908-0-0x0000000010000000-0x0000000010030000-memory.dmp UPX behavioral2/memory/908-1-0x0000000010000000-0x0000000010030000-memory.dmp UPX -
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral2/memory/908-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/908-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1900 908 WerFault.exe 82 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 908 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1600 wrote to memory of 908 1600 rundll32.exe 82 PID 1600 wrote to memory of 908 1600 rundll32.exe 82 PID 1600 wrote to memory of 908 1600 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ed5cc39fcf5946cfd1356ea656bbbdfebbb1fb7fe48aecd523bab9fc8fd355a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ed5cc39fcf5946cfd1356ea656bbbdfebbb1fb7fe48aecd523bab9fc8fd355a.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 7163⤵
- Program crash
PID:1900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 908 -ip 9081⤵PID:2400