Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 00:33
Behavioral task
behavioral1
Sample
b3562c5cf5e860f4d57c65e7bc34a395.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
b3562c5cf5e860f4d57c65e7bc34a395.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
b3562c5cf5e860f4d57c65e7bc34a395.dll
-
Size
1.5MB
-
MD5
b3562c5cf5e860f4d57c65e7bc34a395
-
SHA1
e704849011719333f166f7e47994896a0839f7eb
-
SHA256
57572b71b3b27b0590e116633952cc50c2649b1f8a5a0733b926b87d2d35ebfd
-
SHA512
68c47beac01e0efaf4ef65bae1d64e0584524ebda0f5521a55f08b93727b6cfd565144fe9a9cf1e6dee8fbee111a928f3be2a4a7d880ba37892ace06c98831c7
-
SSDEEP
24576:LC5EBvqtmHHCDGMToep03/da+iuUABRxPWPq03L0UEHxS2f3YJUTwGUDvocy4o4H:bBw+Cygo4Mla+iuVB+/8nfI6n4/
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4800 wrote to memory of 2608 4800 rundll32.exe 94 PID 4800 wrote to memory of 2608 4800 rundll32.exe 94 PID 4800 wrote to memory of 2608 4800 rundll32.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3562c5cf5e860f4d57c65e7bc34a395.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3562c5cf5e860f4d57c65e7bc34a395.dll,#12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4032 --field-trial-handle=2432,i,12161922670941700748,3348345705955601576,262144 --variations-seed-version /prefetch:81⤵PID:1244