Analysis
-
max time kernel
53s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-03-2021 10:31
Static task
static1
Behavioral task
behavioral1
Sample
1243656.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1243656.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
1243656.dll
-
Size
281KB
-
MD5
7a4334c164c28530b28858559643c6b9
-
SHA1
ee3ebcb8b28702c50b0083db163ba5876f40f54c
-
SHA256
b250b1ccb8194ce1ccc86b4a88bd7279f6804fac990758e95d203fdd1d97dcc2
-
SHA512
e58a00c9b7b947d573632097eb056b5791b0b3d4577ff5e4635b8056076d599240e128ac948a995c2c8102b2a2d4550c0d7edbd3d684f5364c44467f64e50c45
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 640 wrote to memory of 1812 640 regsvr32.exe regsvr32.exe PID 640 wrote to memory of 1812 640 regsvr32.exe regsvr32.exe PID 640 wrote to memory of 1812 640 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1243656.dll1⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1243656.dll2⤵PID:1812
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:200