Analysis
-
max time kernel
51s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 13:00
Behavioral task
behavioral1
Sample
65d1cba00dde417be398a4c0ff45d3135166f0db6f8224db7be469fcf904a5b8.dll
Resource
win7-20240220-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
65d1cba00dde417be398a4c0ff45d3135166f0db6f8224db7be469fcf904a5b8.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
65d1cba00dde417be398a4c0ff45d3135166f0db6f8224db7be469fcf904a5b8.dll
-
Size
76KB
-
MD5
0eb5b3046df4ab95e8f0afcbd1fa05e5
-
SHA1
a34e58d7e041531659d95edc837f72875cf28934
-
SHA256
65d1cba00dde417be398a4c0ff45d3135166f0db6f8224db7be469fcf904a5b8
-
SHA512
9918f50af38b583a00bcee0ca3806dea031e192672d2366e064b9f824e5d345cd226a4c67edc8b2a08152adc9b43f2b91606dad66cf517d93d0428fad40b263b
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZUoTA5lpL5C:c8y93KQjy7G55riF1cMo03W5C
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 2 IoCs
resource yara_rule behavioral2/memory/4840-0-0x0000000010000000-0x0000000010030000-memory.dmp UPX behavioral2/memory/4840-1-0x0000000010000000-0x0000000010030000-memory.dmp UPX -
resource yara_rule behavioral2/memory/4840-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4840-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4332 4840 WerFault.exe 81 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4840 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1772 wrote to memory of 4840 1772 rundll32.exe 81 PID 1772 wrote to memory of 4840 1772 rundll32.exe 81 PID 1772 wrote to memory of 4840 1772 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\65d1cba00dde417be398a4c0ff45d3135166f0db6f8224db7be469fcf904a5b8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\65d1cba00dde417be398a4c0ff45d3135166f0db6f8224db7be469fcf904a5b8.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 7123⤵
- Program crash
PID:4332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4840 -ip 48401⤵PID:3792