Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 23:24
Behavioral task
behavioral1
Sample
85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3.dll
Resource
win7-20240215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3.dll
Resource
win10v2004-20240426-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3.dll
-
Size
76KB
-
MD5
147930c5952684ca8aba0510b327c8ab
-
SHA1
ba81df84fdd51652a2f9643d57263c2a72cb0196
-
SHA256
85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3
-
SHA512
bf45c6065c3848e0eab128b80d3e6e39158a3249600ada3d6958c6f6034235b0dbb93f2c6356b4c729ed48372496a0762bfbaa8f7bd414d6f3dc2599c4438ccf
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZnIOjO7ef:c8y93KQjy7G55riF1cMo03NIMf
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/memory/1492-0-0x0000000010000000-0x0000000010030000-memory.dmp UPX behavioral2/memory/1492-2-0x0000000010000000-0x0000000010030000-memory.dmp UPX -
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral2/memory/1492-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1492-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4728 1492 WerFault.exe 81 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1492 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 688 wrote to memory of 1492 688 rundll32.exe 81 PID 688 wrote to memory of 1492 688 rundll32.exe 81 PID 688 wrote to memory of 1492 688 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85e0b8a5e424eb9a20e6aa5af011f139419055376ceb49279e074251e480b4a3.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 7123⤵
- Program crash
PID:4728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1492 -ip 14921⤵PID:4892