Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 04:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b676e943a47df8716301e8f00341eea6.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
b676e943a47df8716301e8f00341eea6.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
b676e943a47df8716301e8f00341eea6.dll
-
Size
192KB
-
MD5
b676e943a47df8716301e8f00341eea6
-
SHA1
4f7776c017ada3b12b5a41a6cc85f9f8a7f06990
-
SHA256
f556f48175c82802b633940d00217db9ffbf6f9ca2487451b3305f42c929d039
-
SHA512
ed3f6f42e0ab48469fd385000106939a9cff7217d3b25bc5eee7b86caa06d7153c086f49fbbc06817a022397be2f3b06ed3e8104bd6475e3c2de812c610560bc
-
SSDEEP
3072:N/3OLp31oJX34EakwyJCkRP0/w4VOr4dOYiXk8ZCzFVY/SlV9xyKIE6tfXpx:530p31oJX34EakwyLUw4VLP1T30EoZx
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2140 1188 rundll32.exe 95 PID 1188 wrote to memory of 2140 1188 rundll32.exe 95 PID 1188 wrote to memory of 2140 1188 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b676e943a47df8716301e8f00341eea6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b676e943a47df8716301e8f00341eea6.dll,#12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3804 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:3452