Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 08:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c2e308fb80a00c37b4e96c279266ad09.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
c2e308fb80a00c37b4e96c279266ad09.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c2e308fb80a00c37b4e96c279266ad09.dll
-
Size
124KB
-
MD5
c2e308fb80a00c37b4e96c279266ad09
-
SHA1
31acd1a55ae52673bac2cdc9678dd36bb0095d21
-
SHA256
2ad29c23a5bfbae4351bae61c5b96468ee2be5552ebdb6fb714da1d498656c44
-
SHA512
b60555bfab96529632437076176be7650ca742eef7e07612137d82bf0190b73ba91264e3844f75b5fdad8e5dff6fa58f23654c623be5c3a1d526b848d4b439a4
-
SSDEEP
3072:AlynY0tmh1i/LcPEfS2EqyjqGfwKCeCOw2R:AsmfgLUEfhGfqegU
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1940 1936 rundll32.exe 90 PID 1936 wrote to memory of 1940 1936 rundll32.exe 90 PID 1936 wrote to memory of 1940 1936 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2e308fb80a00c37b4e96c279266ad09.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2e308fb80a00c37b4e96c279266ad09.dll,#12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=2228,i,521073434451423547,2311651514500527526,262144 --variations-seed-version /prefetch:81⤵PID:2484