Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 19:40
Behavioral task
behavioral1
Sample
0e3ad3eb9e7fef6ae9ab464ec91728a7.dll
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e3ad3eb9e7fef6ae9ab464ec91728a7.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0e3ad3eb9e7fef6ae9ab464ec91728a7.dll
-
Size
55KB
-
MD5
0e3ad3eb9e7fef6ae9ab464ec91728a7
-
SHA1
7f980e1d842e59c32e076c8e0590b896bc506beb
-
SHA256
51871b412039506c385dc02892b1ac2ce6526901f7a9fbb3697da8dfd7ac91e1
-
SHA512
c6bee011bcc008a9768976cdfd47a5629395a9ba335e18e6ac3a9fab0f326914e715630ee03cb3993080f86f0639ca67ccf53fa8d6c4efcf353b1dd338d6f884
-
SSDEEP
1536:f+w0fZDm4+ZsRUdzBnNv+UXXA5d3IF4FZHoeW:f+3xcXfzw5G4/lW
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/396-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3716 wrote to memory of 396 3716 rundll32.exe 88 PID 3716 wrote to memory of 396 3716 rundll32.exe 88 PID 3716 wrote to memory of 396 3716 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e3ad3eb9e7fef6ae9ab464ec91728a7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e3ad3eb9e7fef6ae9ab464ec91728a7.dll,#12⤵PID:396
-