Analysis
-
max time kernel
139s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 05:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
amxread.dll
Resource
win7-20240508-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
amxread.dll
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
amxread.dll
-
Size
23KB
-
MD5
ab4ec6d80de12bed0630d672e7719447
-
SHA1
5154d943b4afcb603cf7db438ae14edf0c9f4f3a
-
SHA256
d61fd2d685243780dd90a81a7d6c0f82bd444a20bc11b00ccdbb879e0b616709
-
SHA512
0391de62d34a3008176d111513b8c10ed26d25e0130b379504c72ed30b3dad1f82aa080a926eda6a3d29773ecf2205348d6bfd6269052edb7254ea4a05db1ba5
-
SSDEEP
384:8C0tGpoWIOfst4Wh6Zv1lBTpPa4kRPINYoLgjUFp1StkmIHPWWJJbGWW+:dbU4WhGv1ltHkRPigjzk9
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 324 5056 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 224 wrote to memory of 5056 224 rundll32.exe 91 PID 224 wrote to memory of 5056 224 rundll32.exe 91 PID 224 wrote to memory of 5056 224 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\amxread.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\amxread.dll,#12⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 6003⤵
- Program crash
PID:324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5056 -ip 50561⤵PID:3708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4168,i,4686244434963378549,11462511444150484980,262144 --variations-seed-version --mojo-platform-channel-handle=4148 /prefetch:81⤵PID:3940