Analysis
-
max time kernel
127s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 01:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c4a2b05334238d28f4f56381b1306d8c.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c4a2b05334238d28f4f56381b1306d8c.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
c4a2b05334238d28f4f56381b1306d8c.dll
-
Size
258KB
-
MD5
c4a2b05334238d28f4f56381b1306d8c
-
SHA1
52eac64d13da8772e7748d4cdb19d6a637ba5e66
-
SHA256
e59b42ad41431fbfce669a6cc366fbb6e8713ee4dd6fea3bee58c2d92e83eb9c
-
SHA512
2322f071f6a565b1aaa1e4a6b73d2d5d09bdb3a606c2a15da7ef8dc808c303141a833716f1c5ab82d5af4f542197211fcbc97f9363e0dc87a4d342a718a1ff9c
-
SSDEEP
6144:iwOnly+xJF29KMzkTQ3JdhcXAQcOZiDrx/zGgpebF+U7GTGgOmz:iHnl3xJFkVhcXAQcOZiDrx/zRp2F+U7E
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3652 wrote to memory of 4676 3652 rundll32.exe 95 PID 3652 wrote to memory of 4676 3652 rundll32.exe 95 PID 3652 wrote to memory of 4676 3652 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4a2b05334238d28f4f56381b1306d8c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c4a2b05334238d28f4f56381b1306d8c.dll,#12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=3016,i,1323102786462900035,7687994236215859601,262144 --variations-seed-version /prefetch:81⤵PID:3652