Analysis
-
max time kernel
143s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 23:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ef06947d96ef7b7660d1e247cb845384.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ef06947d96ef7b7660d1e247cb845384.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
ef06947d96ef7b7660d1e247cb845384.dll
-
Size
3KB
-
MD5
ef06947d96ef7b7660d1e247cb845384
-
SHA1
26f0334f4907e64542674ec1dad133e7a61f363e
-
SHA256
4d08cbdbe9ea165a0f15821fde8880cb9e9deb1368cc55393d318f4f54bce648
-
SHA512
328f13d862649483dc2d5b5787800dcc2c760ff318148428fca32a97732b227fc868615f9a1ada195b155d2f12087a3d9faea4183af3bc4c978ecc48c678a2f6
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 732 wrote to memory of 1348 732 rundll32.exe 93 PID 732 wrote to memory of 1348 732 rundll32.exe 93 PID 732 wrote to memory of 1348 732 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef06947d96ef7b7660d1e247cb845384.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef06947d96ef7b7660d1e247cb845384.dll,#12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:81⤵PID:3520