Analysis
-
max time kernel
101s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 23:39
Static task
static1
Behavioral task
behavioral1
Sample
Windows.ApplicationModel.Store.dll
Resource
win7-20230220-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
Windows.ApplicationModel.Store.dll
Resource
win10v2004-20230220-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
Windows.ApplicationModel.Store.dll
-
Size
1.6MB
-
MD5
84b61da6030dbf811207951f69aa7263
-
SHA1
92f46f5e11d1635ad48fee5c3d1b1632fcb5f549
-
SHA256
ceae86e550dc1daa1b364be1ac195dd5dd9eaea8bfdf1875a4ae832c3e1a42a2
-
SHA512
50f54d90877e205ab96c0c2d81cee7a475dd03b0e9b3d6c5f2092170379d7d363b39b63c577e71d7b83216de11d60fe87673f5b9681804f1ed4dd29ea558b6d8
-
SSDEEP
24576:sVwwz/RBXZc0pFoj2JhzeOwbwHXvZ9kOvSTqWXXMhVf87JLZBCzdF:sVwwLLpFHwBbwHfZNAMhY07
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 436 wrote to memory of 3992 436 rundll32.exe 85 PID 436 wrote to memory of 3992 436 rundll32.exe 85 PID 436 wrote to memory of 3992 436 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Windows.ApplicationModel.Store.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Windows.ApplicationModel.Store.dll,#12⤵PID:3992
-