Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 20:27
Behavioral task
behavioral1
Sample
39c6b715b292ce1cfc119d418507c9c49c8e593930995e57fdb3bbbe3c17bf86.dll
Resource
win7-20240508-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
39c6b715b292ce1cfc119d418507c9c49c8e593930995e57fdb3bbbe3c17bf86.dll
Resource
win10v2004-20240508-en
5 signatures
150 seconds
General
-
Target
39c6b715b292ce1cfc119d418507c9c49c8e593930995e57fdb3bbbe3c17bf86.dll
-
Size
76KB
-
MD5
e676552847fbdbcf4dc89db13f2b7b31
-
SHA1
04a6733d45e97273707049b044a7121ad51daceb
-
SHA256
39c6b715b292ce1cfc119d418507c9c49c8e593930995e57fdb3bbbe3c17bf86
-
SHA512
c0dc6e7a33bb2e1e0262ceffc9dc09bdc9b89047051ef0ca9ff0bb974d3192d931804ab42143c57847416060eecf27a2aace0c82508e47424c219ee9c590e734
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Z1de4x:c8y93KQjy7G55riF1cMo033g8
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/memory/4200-0-0x0000000010000000-0x0000000010030000-memory.dmp UPX behavioral2/memory/4200-1-0x0000000010000000-0x0000000010030000-memory.dmp UPX -
resource yara_rule behavioral2/memory/4200-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4200-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4416 4200 WerFault.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4200 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3596 wrote to memory of 4200 3596 rundll32.exe 85 PID 3596 wrote to memory of 4200 3596 rundll32.exe 85 PID 3596 wrote to memory of 4200 3596 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39c6b715b292ce1cfc119d418507c9c49c8e593930995e57fdb3bbbe3c17bf86.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39c6b715b292ce1cfc119d418507c9c49c8e593930995e57fdb3bbbe3c17bf86.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:4200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 6763⤵
- Program crash
PID:4416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4200 -ip 42001⤵PID:704