Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0e80e88d64c6fc713ba47630f197eed1.dll
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e80e88d64c6fc713ba47630f197eed1.dll
Resource
win10v2004-20231222-en
1 signatures
150 seconds
General
-
Target
0e80e88d64c6fc713ba47630f197eed1.dll
-
Size
32KB
-
MD5
0e80e88d64c6fc713ba47630f197eed1
-
SHA1
0beb24092b90b216ee78d6a11883bc473059b181
-
SHA256
456f4a5df29c13e131ea9c30642d2d612c63fcb82fe5d071d65bb15087652b21
-
SHA512
6f5755c91ed589b8504e06bd2eee435507b4a4f194e9300ed45514b1652dedf36a747034b753e29380f5723ebbaba7485cd6c3b23f604b4536d8f6a7497063e3
-
SSDEEP
768:GbHiJWRCmEPZMSEVVr4vq7CymaKdSVOyeRYjI+3:GbHiJDmKMSEVVd7Cd7G6RYUO
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 3512 1944 rundll32.exe 14 PID 1944 wrote to memory of 3512 1944 rundll32.exe 14 PID 1944 wrote to memory of 3512 1944 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e80e88d64c6fc713ba47630f197eed1.dll,#11⤵PID:3512
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e80e88d64c6fc713ba47630f197eed1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1944