Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 13:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b7850c6be3a90141567bbfc08f46af12.dll
Resource
win7-20240215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
b7850c6be3a90141567bbfc08f46af12.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
b7850c6be3a90141567bbfc08f46af12.dll
-
Size
133KB
-
MD5
b7850c6be3a90141567bbfc08f46af12
-
SHA1
f5ff85728a8d0aca219cfb015fb366423105078b
-
SHA256
bff310410b7d9e19586344a51995d5bbf783dc5520b8aa8e941f527ffbc1e54b
-
SHA512
3ff71641d9b18544b8049747de800a8ae44f1f46826828f2422801f2a2d6387d180276add63680972913331362375f31e8491c8f465f44b1b452f9c36b14e91e
-
SSDEEP
1536:du6mhgQByFNwJlt1VBf2vn2u5nx2U7YoU3TWOVcy9Y8LU6B6XQX3yf+9zdvJN/pe:UdGQ8qJ3hf2PfclbXH3tsv3xcKYfR8G
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2496 2368 rundll32.exe 96 PID 2368 wrote to memory of 2496 2368 rundll32.exe 96 PID 2368 wrote to memory of 2496 2368 rundll32.exe 96
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7850c6be3a90141567bbfc08f46af12.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7850c6be3a90141567bbfc08f46af12.dll,#12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4032 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:3992