Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 23:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
be18e3d99466ddf492046e22a726d731.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
be18e3d99466ddf492046e22a726d731.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
be18e3d99466ddf492046e22a726d731.dll
-
Size
6KB
-
MD5
be18e3d99466ddf492046e22a726d731
-
SHA1
a64ab6436341d807982e71968901ef91231d72da
-
SHA256
c6f0327e84585439d125e361fa10f2170988f989e06068dd97406fa5b6cf9496
-
SHA512
b37b45709c793f9f8e665900f34f2b737898e1e9a0c08c357600c126a037d14550ef9e034d9171d412d214a341b25bf77db78ed433945137d4cdf8f69f964a27
-
SSDEEP
48:63mll5YVOa9VUX1iwbQWu0PB+BDq9J5SH:VDa9VUX9bQWvB+FqX5SH
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4700 wrote to memory of 5548 4700 rundll32.exe 93 PID 4700 wrote to memory of 5548 4700 rundll32.exe 93 PID 4700 wrote to memory of 5548 4700 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be18e3d99466ddf492046e22a726d731.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be18e3d99466ddf492046e22a726d731.dll,#12⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3100 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:5828