Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 00:33

General

  • Target

    b3562c5cf5e860f4d57c65e7bc34a395.dll

  • Size

    1.5MB

  • MD5

    b3562c5cf5e860f4d57c65e7bc34a395

  • SHA1

    e704849011719333f166f7e47994896a0839f7eb

  • SHA256

    57572b71b3b27b0590e116633952cc50c2649b1f8a5a0733b926b87d2d35ebfd

  • SHA512

    68c47beac01e0efaf4ef65bae1d64e0584524ebda0f5521a55f08b93727b6cfd565144fe9a9cf1e6dee8fbee111a928f3be2a4a7d880ba37892ace06c98831c7

  • SSDEEP

    24576:LC5EBvqtmHHCDGMToep03/da+iuUABRxPWPq03L0UEHxS2f3YJUTwGUDvocy4o4H:bBw+Cygo4Mla+iuVB+/8nfI6n4/

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b3562c5cf5e860f4d57c65e7bc34a395.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b3562c5cf5e860f4d57c65e7bc34a395.dll,#1
      2⤵
        PID:2608
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4032 --field-trial-handle=2432,i,12161922670941700748,3348345705955601576,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:1244

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2608-0-0x0000000002500000-0x0000000002938000-memory.dmp

              Filesize

              4.2MB

            • memory/2608-1-0x0000000002990000-0x00000000029E0000-memory.dmp

              Filesize

              320KB

            • memory/2608-2-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

              Filesize

              4KB

            • memory/2608-3-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

              Filesize

              4KB

            • memory/2608-4-0x0000000002B20000-0x0000000002B21000-memory.dmp

              Filesize

              4KB

            • memory/2608-5-0x0000000002B30000-0x0000000002B31000-memory.dmp

              Filesize

              4KB

            • memory/2608-6-0x0000000002B70000-0x0000000002B71000-memory.dmp

              Filesize

              4KB

            • memory/2608-7-0x0000000002B40000-0x0000000002B41000-memory.dmp

              Filesize

              4KB

            • memory/2608-8-0x0000000003430000-0x0000000003431000-memory.dmp

              Filesize

              4KB

            • memory/2608-19-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

              Filesize

              4KB

            • memory/2608-18-0x0000000002BF0000-0x0000000002BF1000-memory.dmp

              Filesize

              4KB

            • memory/2608-17-0x0000000002C20000-0x0000000002C21000-memory.dmp

              Filesize

              4KB

            • memory/2608-16-0x0000000002BE0000-0x0000000002BE1000-memory.dmp

              Filesize

              4KB

            • memory/2608-14-0x0000000002B90000-0x0000000002B91000-memory.dmp

              Filesize

              4KB

            • memory/2608-15-0x0000000002BD0000-0x0000000002BD1000-memory.dmp

              Filesize

              4KB

            • memory/2608-13-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

              Filesize

              4KB

            • memory/2608-20-0x0000000002C50000-0x0000000002C51000-memory.dmp

              Filesize

              4KB

            • memory/2608-12-0x0000000002C10000-0x0000000002C11000-memory.dmp

              Filesize

              4KB

            • memory/2608-22-0x0000000002C80000-0x0000000002C81000-memory.dmp

              Filesize

              4KB

            • memory/2608-21-0x0000000002C40000-0x0000000002C41000-memory.dmp

              Filesize

              4KB

            • memory/2608-11-0x0000000003420000-0x0000000003421000-memory.dmp

              Filesize

              4KB

            • memory/2608-10-0x0000000003430000-0x0000000003431000-memory.dmp

              Filesize

              4KB

            • memory/2608-9-0x0000000002B10000-0x0000000002B11000-memory.dmp

              Filesize

              4KB

            • memory/2608-24-0x0000000002C70000-0x0000000002C71000-memory.dmp

              Filesize

              4KB

            • memory/2608-23-0x0000000002C90000-0x0000000002C91000-memory.dmp

              Filesize

              4KB

            • memory/2608-25-0x0000000003470000-0x0000000003870000-memory.dmp

              Filesize

              4.0MB

            • memory/2608-26-0x0000000003470000-0x0000000003870000-memory.dmp

              Filesize

              4.0MB