Analysis
-
max time kernel
160s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
13e93a9125414009ecc770457cdd41b9.dll
Resource
win7-20231129-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
13e93a9125414009ecc770457cdd41b9.dll
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
13e93a9125414009ecc770457cdd41b9.dll
-
Size
6KB
-
MD5
13e93a9125414009ecc770457cdd41b9
-
SHA1
5265279b375677e89bd51adfc35b83c63330055b
-
SHA256
66f1538830834389e7d20efb83edcc8a632e6b1be6e421f7b11cabd026d06a70
-
SHA512
fa59377b4e05706ed8779fa1644013dd98704140e787b3ef3bfe9787ab4d86602072ee08a8a55e8249e3067932769d0f60f5ad45f9dadd7d1719ccc8871140d0
-
SSDEEP
48:6AA35YVOQDV8FszwydlAYsLFV3G02B+BDq9J5S2:0QDV8FscMjsLFV3uB+FqX5S2
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5016 wrote to memory of 2656 5016 rundll32.exe 90 PID 5016 wrote to memory of 2656 5016 rundll32.exe 90 PID 5016 wrote to memory of 2656 5016 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\13e93a9125414009ecc770457cdd41b9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\13e93a9125414009ecc770457cdd41b9.dll,#12⤵PID:2656
-