Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 11:31
Static task
static1
Behavioral task
behavioral1
Sample
e31553f33eca2d232994d2cc1056d1b8426c3e8d4c12aa12a93544b95793d558.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e31553f33eca2d232994d2cc1056d1b8426c3e8d4c12aa12a93544b95793d558.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
6ad39193ed20078aa1b23c33a1e48859
-
SHA1
95e70e4f47aa1689cc08afbdaef3ec323b5342fa
-
SHA256
b9631423a50c666faf2cc6901c5a8d6eb2fecd306fdd2524256b7e2e37b251c2
-
SHA512
78c89bb8c86f3b68e5314467eca4e8e922d143335081fa66b01d756303e1aec68ed01f4be7098dbe06a789ca32a0f31102f5ba408bc5ab28e61251611bb4f62b
-
SSDEEP
96:qIsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9Fug:ZVL7ikJb76BQUoUm+RnyXVYO2RvHFug
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1352 2224 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2224 1664 rundll32.exe 28 PID 1664 wrote to memory of 2224 1664 rundll32.exe 28 PID 1664 wrote to memory of 2224 1664 rundll32.exe 28 PID 1664 wrote to memory of 2224 1664 rundll32.exe 28 PID 1664 wrote to memory of 2224 1664 rundll32.exe 28 PID 1664 wrote to memory of 2224 1664 rundll32.exe 28 PID 1664 wrote to memory of 2224 1664 rundll32.exe 28 PID 2224 wrote to memory of 1352 2224 rundll32.exe 29 PID 2224 wrote to memory of 1352 2224 rundll32.exe 29 PID 2224 wrote to memory of 1352 2224 rundll32.exe 29 PID 2224 wrote to memory of 1352 2224 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 2283⤵
- Program crash
PID:1352
-
-