Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 23:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1470afbd928f62559fc1263b1dadcd40.dll
Resource
win7-20240704-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1470afbd928f62559fc1263b1dadcd40.dll
Resource
win10v2004-20240704-en
1 signatures
150 seconds
General
-
Target
1470afbd928f62559fc1263b1dadcd40.dll
-
Size
3KB
-
MD5
1470afbd928f62559fc1263b1dadcd40
-
SHA1
d91626a06ffd59765659b67b0b2945cde7cda9c3
-
SHA256
9f73471edce0e5051cda40bc50f60730cb06a485ccb8b653f369792882ba9d98
-
SHA512
73cbcae0bbf8bc8ea6b50457fc6f5e5afe6a99c78b1ffa8d205c0e0ec8726461e0db35e32e62951bbf9cc8301ffbba4298b689fdf2bb4a31e51001e067e8f3af
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3580 wrote to memory of 1044 3580 rundll32.exe 89 PID 3580 wrote to memory of 1044 3580 rundll32.exe 89 PID 3580 wrote to memory of 1044 3580 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1470afbd928f62559fc1263b1dadcd40.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1470afbd928f62559fc1263b1dadcd40.dll,#12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1444,i,16032378445269040051,10701855434060315937,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:81⤵PID:2344