Analysis
-
max time kernel
96s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
bed14afc3dce3075b2a6d959d334997f.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bed14afc3dce3075b2a6d959d334997f.dll
Resource
win10v2004-20231215-en
General
-
Target
bed14afc3dce3075b2a6d959d334997f.dll
-
Size
129KB
-
MD5
bed14afc3dce3075b2a6d959d334997f
-
SHA1
fa050b13eff24862f5121d77b0e9729d2fd6e84c
-
SHA256
02174ff871cf1a3f1d2335966a8505afdfb8c262746f5ea31644b8b4c67bb1d9
-
SHA512
af17ed2b21f80e8df31a75696b2ad5e9ea12a989a211d296105f03608248de7ac9d160846b962a53ed66fe675ed6e805cdd4340a4f04af0cfc06af71612f0669
-
SSDEEP
1536:PYzWhVBVvh0mWcMbpGauROAg7fXaNaBw:PYiPfvCmjvZRbg7fXOaBw
Malware Config
Signatures
-
Suspicious behavior: LoadsDriver 21 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3420 wrote to memory of 2328 3420 rundll32.exe 85 PID 3420 wrote to memory of 2328 3420 rundll32.exe 85 PID 3420 wrote to memory of 2328 3420 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bed14afc3dce3075b2a6d959d334997f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bed14afc3dce3075b2a6d959d334997f.dll,#12⤵PID:2328
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dd806e75dd85f56d06a7b2e62af817b0
SHA14d085bf7c42b98c822895cec53b8f2652226d7b6
SHA2566a323aa25eafaaf90796014528239e0555d1c18c2c12a0cfe9d7eaf93154d3b3
SHA5124493d829a7eeff0072b7d94065b6c7be4b728542953f8fb63805902587eaa31137132aec65d9ffccdff5b53e4f056e35a4e330deb7bbf7b05965f33b5133e8c5
-
Filesize
58B
MD55602febf87bd4c535da2d4e90f56e52b
SHA1e563ac3a277e614480525dc60061a06afe1a0419
SHA256569f5ce34e8e491d1b425b57cc90c1463d72eb531983727557802b17c148486b
SHA512b0e8186706e004b800f3e554171c2a3d8c7391b5d0ba8694380fdfdd12fb09330033a1af29bdc8898a09fabad611aaa98e3deb51d2e4d6e1e0d524b673eddb0f