Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 12:46
Behavioral task
behavioral1
Sample
dc7bf940a3b1e9f7108c97d8f45c04c0N.dll
Resource
win7-20240704-en
windows7-x64
5 signatures
120 seconds
Behavioral task
behavioral2
Sample
dc7bf940a3b1e9f7108c97d8f45c04c0N.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
4 signatures
120 seconds
General
-
Target
dc7bf940a3b1e9f7108c97d8f45c04c0N.dll
-
Size
76KB
-
MD5
dc7bf940a3b1e9f7108c97d8f45c04c0
-
SHA1
0bad6f62b3b1791d85fb22e46a1d489a78cdbbb0
-
SHA256
a91712613799b95076fd5fbf2da4281f0ea2e95a9a6e9126b5c00a89da579992
-
SHA512
19061d424d1178a298c80121a28aef59cf01c1b4b9827bc7284f8fa3bd0f04fe140d9c9ad476fed9b16a189bf1c6a216fab380a3ddf1307c73ff8384dadff82c
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Zoi8QhssYE:c8y93KQjy7G55riF1cMo03SOysz
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/552-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/552-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3972 552 WerFault.exe 83 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 552 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3280 wrote to memory of 552 3280 rundll32.exe 83 PID 3280 wrote to memory of 552 3280 rundll32.exe 83 PID 3280 wrote to memory of 552 3280 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc7bf940a3b1e9f7108c97d8f45c04c0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc7bf940a3b1e9f7108c97d8f45c04c0N.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 6963⤵
- Program crash
PID:3972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 552 -ip 5521⤵PID:4704