Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 01:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ad553158e75984fd3064922988239aef.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ad553158e75984fd3064922988239aef.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
ad553158e75984fd3064922988239aef.dll
-
Size
182KB
-
MD5
ad553158e75984fd3064922988239aef
-
SHA1
fe4444853875cdcc4d7a20d6ae0f2bd43a34b22b
-
SHA256
30c69b5474d9bdf8d27a53aab9bfaf8ceb4b2e354f5e5e304b8983d6e9782242
-
SHA512
83cf0e9ac2f281ed5338c516ca6d40f39e2b6917fc23418c6b0322518f5187d6f9003e790bbce7b6db2305bd374a7aef24f43eeccb9c34683fc5b5ccdf72b6ed
-
SSDEEP
3072:hSboJsjLXwCKUDtfsQz/aoCx9RKYapx6gN3g+k5b1UdXYPYnEZdCBs2yNFByK2rP:Y97RD6QDaPQog1Lk5xUd+Y0dOKGP
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2904 1720 rundll32.exe 94 PID 1720 wrote to memory of 2904 1720 rundll32.exe 94 PID 1720 wrote to memory of 2904 1720 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad553158e75984fd3064922988239aef.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad553158e75984fd3064922988239aef.dll,#12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2232 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:2836