Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
bed6d6fb7255f5d97b7c82bf9e87c5ec.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bed6d6fb7255f5d97b7c82bf9e87c5ec.dll
Resource
win10v2004-20231215-en
General
-
Target
bed6d6fb7255f5d97b7c82bf9e87c5ec.dll
-
Size
1.1MB
-
MD5
bed6d6fb7255f5d97b7c82bf9e87c5ec
-
SHA1
7ff594bf3035ff5f8244ca0982e6dd2f1f91d87a
-
SHA256
c1a20ea794b6adbcf83782372cf1eaa4421b11a995c6c2450894f5e499a2bd1a
-
SHA512
533dd8de44eaf71c59703abc3c9ee3b8dab5cb181bccc5c68613944c88fddd250122904a293fdbaef83c0328d71ac0f933ba91f1a358c150ad5bbd86c8ce95af
-
SSDEEP
24576:SMpZ4OxwR1QcQq/W7ihb4bPWmBLXvPmVpTrdzjs00D:SuNZ7Ib8ZBL2/XE
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dticem\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bed6d6fb7255f5d97b7c82bf9e87c5ec.dll" regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\8ef78b9534.dll svchost.exe File opened for modification C:\Windows\SysWOW64\8ef78b9534.dll svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 832 4832 regsvr32.exe 83 PID 4832 wrote to memory of 832 4832 regsvr32.exe 83 PID 4832 wrote to memory of 832 4832 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\bed6d6fb7255f5d97b7c82bf9e87c5ec.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\bed6d6fb7255f5d97b7c82bf9e87c5ec.dll2⤵
- Sets DLL path for service in the registry
PID:832
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k dtcGep -s dticem1⤵
- Drops file in System32 directory
PID:2940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100B
MD5823169cb1e6b6bbbb364ed366bbc144b
SHA15fe5291f2c2a996d9d73f241b9221acdccbe2bb8
SHA256c0e20e7b4f3233f928fdce768093902239499afbec4d611c73f8edc9bbe49a6d
SHA512180c8b49d64cc3361f827015110831a6d11bd3ff9f400c0b27ddbb5a7b93a878400fc73b3cc087f3f087f6cf8b6b6f3aca4fb2a03aaa2463f6ff48c981b6917a