Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 19:37
Behavioral task
behavioral1
Sample
bede15952216c45f550b205956934c2337f14ea05baf9495da28fab5915e5653.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bede15952216c45f550b205956934c2337f14ea05baf9495da28fab5915e5653.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
bede15952216c45f550b205956934c2337f14ea05baf9495da28fab5915e5653.dll
-
Size
51KB
-
MD5
da09bb11da4ece382b6ac519bea8a3a9
-
SHA1
8a5cfa5bac6f568d2489144fee6d16fbfe069459
-
SHA256
bede15952216c45f550b205956934c2337f14ea05baf9495da28fab5915e5653
-
SHA512
e5b6476e6dd8400206427f531bb2fce841920a676d25fe182b788a7a17a5a67ffb39f586880e85970ac203f1ac3b7090dafa0c5ba3de67fdedc0f5f0d0c9723c
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLzJYH5:1dWubF3n9S91BF3fbofJYH5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3920 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1436 wrote to memory of 3920 1436 rundll32.exe 84 PID 1436 wrote to memory of 3920 1436 rundll32.exe 84 PID 1436 wrote to memory of 3920 1436 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bede15952216c45f550b205956934c2337f14ea05baf9495da28fab5915e5653.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bede15952216c45f550b205956934c2337f14ea05baf9495da28fab5915e5653.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3920
-