Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 21:21
Behavioral task
behavioral1
Sample
eb16cce064a6b23c59f160faaf544dd518a70afd01a51211f6c419107e2893fb.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
eb16cce064a6b23c59f160faaf544dd518a70afd01a51211f6c419107e2893fb.dll
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
eb16cce064a6b23c59f160faaf544dd518a70afd01a51211f6c419107e2893fb.dll
-
Size
206KB
-
MD5
0acc2fbfc986cf3462087ae9ae786d08
-
SHA1
77b6e21abff7780d91e15284b4644c8ceb6e31ba
-
SHA256
eb16cce064a6b23c59f160faaf544dd518a70afd01a51211f6c419107e2893fb
-
SHA512
6efc97c64dc506ee094ad43cf19a7c888e54f4faeeb3150d4eff72ed0289cb30e00d313e5a08b6a59ff4725be36dde80079cdfa698473a8b2032f452293a1c51
-
SSDEEP
3072:ZnT2RRXuwcN3OQXB8CITr9VV2ILe126JyTuBdjdUX5R0j:ZwXupN1x8CgBbRLDTuLj
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1676 5016 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2412 wrote to memory of 5016 2412 rundll32.exe rundll32.exe PID 2412 wrote to memory of 5016 2412 rundll32.exe rundll32.exe PID 2412 wrote to memory of 5016 2412 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb16cce064a6b23c59f160faaf544dd518a70afd01a51211f6c419107e2893fb.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb16cce064a6b23c59f160faaf544dd518a70afd01a51211f6c419107e2893fb.dll,#12⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 6323⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 5016 -ip 50161⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3744 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵