Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 09:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
14bedea5ca70099799b65f1d93ec3ef2.dll
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
14bedea5ca70099799b65f1d93ec3ef2.dll
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
14bedea5ca70099799b65f1d93ec3ef2.dll
-
Size
676KB
-
MD5
14bedea5ca70099799b65f1d93ec3ef2
-
SHA1
e23d7e63ae89a4d50a445feeabbd1e11e829ebef
-
SHA256
af74eeecfed4d7198fc6b21e5822e6128a9b42efd2705116ec974958f307f445
-
SHA512
124e54b0689883496288d881ef3c48d329f30b3d2c02d81877c3d97ce7a66420ce877819782e041fe8b02810af5933eab716ed1a23e9cdcb9818cbad4115903c
-
SSDEEP
12288:o5IHzl5hu9NxmQfVy0d90+KGyyXU+AMLol47RyQV3T:oirh+xPcy0jGJUjeo6tvT
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\8adp0.sys rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\{093DB85ADC7B8F42686A263506B30CE4}\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\6B2E.tmp" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3384 regsvr32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4904 wrote to memory of 996 4904 rundll32.exe 16 PID 4904 wrote to memory of 996 4904 rundll32.exe 16 PID 4904 wrote to memory of 996 4904 rundll32.exe 16 PID 996 wrote to memory of 3384 996 rundll32.exe 93 PID 996 wrote to memory of 3384 996 rundll32.exe 93 PID 996 wrote to memory of 3384 996 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14bedea5ca70099799b65f1d93ec3ef2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14bedea5ca70099799b65f1d93ec3ef2.dll,#12⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4B90.tmp3⤵
- Loads dropped DLL
PID:3384
-
-