Analysis
-
max time kernel
134s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 23:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d74b96250f27b402f90d351500ab0b83.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d74b96250f27b402f90d351500ab0b83.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
d74b96250f27b402f90d351500ab0b83.dll
-
Size
90KB
-
MD5
d74b96250f27b402f90d351500ab0b83
-
SHA1
533ab02215f40b306a7b4833e00396744928b096
-
SHA256
142d41b5ee907d0083fd8b41347588223b1c083241504e84a3235243753a685e
-
SHA512
6a8c9ffb8dbeec32dbb2271e9ac16d3ba03e8dc22fcd014c79d29845c1debbd23880079dd2ec1c86dc6972be592c6cf02a43a564c07b40753739c3391ceb3e59
-
SSDEEP
1536:xerLjvQG9R6yZJJuK0KKMu3XuY8sL0wLMtvj/YuNAG+MF7u4f7y0Nz9dGKq:krLLQWEQJ4KKMuHYsCtvBV77y0pGK
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3812 3984 WerFault.exe 96 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3648 wrote to memory of 3984 3648 rundll32.exe 96 PID 3648 wrote to memory of 3984 3648 rundll32.exe 96 PID 3648 wrote to memory of 3984 3648 rundll32.exe 96
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d74b96250f27b402f90d351500ab0b83.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d74b96250f27b402f90d351500ab0b83.dll,#12⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 5483⤵
- Program crash
PID:3812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3984 -ip 39841⤵PID:884
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3688 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:81⤵PID:2696