Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 19:12
Behavioral task
behavioral1
Sample
bfd1ae116e75099e0a78735fd3192e01e896052eaa8970c46bd508ab74b01f0b.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bfd1ae116e75099e0a78735fd3192e01e896052eaa8970c46bd508ab74b01f0b.dll
Resource
win10v2004-20240226-en
General
-
Target
bfd1ae116e75099e0a78735fd3192e01e896052eaa8970c46bd508ab74b01f0b.dll
-
Size
899KB
-
MD5
6eb1b53aca7e4fc25ff88ac538de1203
-
SHA1
78ce52abe4d06fcc76c48628bdb94bf955e6a87c
-
SHA256
bfd1ae116e75099e0a78735fd3192e01e896052eaa8970c46bd508ab74b01f0b
-
SHA512
be91fb280293a6a19246ea4fa61d7d8c0a354cd1d4372742655007c569c7bff07901f06502521fc7aab9247e251e6deba5395fef9f23bede3ae3bcf1db5d4e60
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXg:7wqd87Vg
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2924 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1188 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2924 1564 rundll32.exe 89 PID 1564 wrote to memory of 2924 1564 rundll32.exe 89 PID 1564 wrote to memory of 2924 1564 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfd1ae116e75099e0a78735fd3192e01e896052eaa8970c46bd508ab74b01f0b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bfd1ae116e75099e0a78735fd3192e01e896052eaa8970c46bd508ab74b01f0b.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2924
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4216
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1188
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5be98db19a8bef4b5304692f8c1f9bbb5
SHA1864bf6a242292e859880dd1507ded86dfc73527c
SHA2561c989698e06b309165877039fd73a9e5ade5f6a16f6d643950315a1228f900e6
SHA5128787364b9bc964e27abb677d2bf5fe3e9bb2acba06a5877fdde1c3626e7667c78005cec8dbd492f8668b075421dc08bad00e9f35217dbb99aff682f475259b6c