Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
47eb218f834950ed8c2ddb006f2a00aa938b5b081632ea0a2b07cc9f164790e3.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47eb218f834950ed8c2ddb006f2a00aa938b5b081632ea0a2b07cc9f164790e3.dll
Resource
win10v2004-20240611-en
General
-
Target
47eb218f834950ed8c2ddb006f2a00aa938b5b081632ea0a2b07cc9f164790e3.dll
-
Size
540KB
-
MD5
145e31b426b9ec7c931434e4261534d2
-
SHA1
186275d4164393d016064d5e6fec5efccf1b6c76
-
SHA256
47eb218f834950ed8c2ddb006f2a00aa938b5b081632ea0a2b07cc9f164790e3
-
SHA512
ca0401085a20993a869760787c214b29a59619b4f8d07049170ac7cf889c42f25f59d3974a4b1fb2405c312338c3b001b51a4d921f234b8da0607232d6274bce
-
SSDEEP
12288:IWPo5UNkBSBHjj46N6mwe3DQT5t/MwV+I8:IWPKNBS5jc2we36lMwkl
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4984 wrote to memory of 3376 4984 regsvr32.exe 92 PID 4984 wrote to memory of 3376 4984 regsvr32.exe 92 PID 4984 wrote to memory of 3376 4984 regsvr32.exe 92
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\47eb218f834950ed8c2ddb006f2a00aa938b5b081632ea0a2b07cc9f164790e3.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\47eb218f834950ed8c2ddb006f2a00aa938b5b081632ea0a2b07cc9f164790e3.dll2⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4408,i,6870419347051655189,5491911050420577193,262144 --variations-seed-version --mojo-platform-channel-handle=4192 /prefetch:81⤵PID:3836