Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
d9b10629800aa867f8d101bd5c86d6b0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d9b10629800aa867f8d101bd5c86d6b0N.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240709-en
General
-
Target
$PLUGINSDIR/nsProcess.dll
-
Size
4KB
-
MD5
f0438a894f3a7e01a4aae8d1b5dd0289
-
SHA1
b058e3fcfb7b550041da16bf10d8837024c38bf6
-
SHA256
30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
-
SHA512
f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
SSDEEP
48:Sz4joMeH+Iwdf8Rom/L+rOnnk5/OCnXeAdbdOAa4GPI+CJ87eILzlq7gthwIsEQW:64c/eFdfS/SSnkxNa4G+ueqPuCtGsj
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2380 2572 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2572 2420 rundll32.exe 30 PID 2420 wrote to memory of 2572 2420 rundll32.exe 30 PID 2420 wrote to memory of 2572 2420 rundll32.exe 30 PID 2420 wrote to memory of 2572 2420 rundll32.exe 30 PID 2420 wrote to memory of 2572 2420 rundll32.exe 30 PID 2420 wrote to memory of 2572 2420 rundll32.exe 30 PID 2420 wrote to memory of 2572 2420 rundll32.exe 30 PID 2572 wrote to memory of 2380 2572 rundll32.exe 31 PID 2572 wrote to memory of 2380 2572 rundll32.exe 31 PID 2572 wrote to memory of 2380 2572 rundll32.exe 31 PID 2572 wrote to memory of 2380 2572 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsProcess.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsProcess.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 2243⤵
- Program crash
PID:2380
-
-