Analysis
-
max time kernel
61s -
max time network
68s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-03-2021 17:09
Static task
static1
Behavioral task
behavioral1
Sample
ISLeRPs.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ISLeRPs.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
ISLeRPs.dll
-
Size
744KB
-
MD5
34379df22c95ed0f82ccb5f91f8a7069
-
SHA1
5bf00c67f45de592866b2fc91963dc83057390f4
-
SHA256
77184f1532fef0b593262fdd95ff1f2d2637fe08be003304d4e44f358c67b2d1
-
SHA512
bd446f119df944c9c7ea0603e3b05f893d030b337163cd527c00c0f601ea24ceabdc77f26103e9002daac0597d6e390b8ebf3296bc904f469d243f235c4cd35e
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
Processes:
msiexec.exeflow pid process 14 2368 msiexec.exe 16 2368 msiexec.exe 18 2368 msiexec.exe 20 2368 msiexec.exe 22 2368 msiexec.exe 24 2368 msiexec.exe 26 2368 msiexec.exe 28 2368 msiexec.exe 31 2368 msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1812 set thread context of 2368 1812 regsvr32.exe msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
msiexec.exedescription pid process Token: SeSecurityPrivilege 2368 msiexec.exe Token: SeSecurityPrivilege 2368 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 636 wrote to memory of 1812 636 regsvr32.exe regsvr32.exe PID 636 wrote to memory of 1812 636 regsvr32.exe regsvr32.exe PID 636 wrote to memory of 1812 636 regsvr32.exe regsvr32.exe PID 1812 wrote to memory of 2368 1812 regsvr32.exe msiexec.exe PID 1812 wrote to memory of 2368 1812 regsvr32.exe msiexec.exe PID 1812 wrote to memory of 2368 1812 regsvr32.exe msiexec.exe PID 1812 wrote to memory of 2368 1812 regsvr32.exe msiexec.exe PID 1812 wrote to memory of 2368 1812 regsvr32.exe msiexec.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ISLeRPs.dll1⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ISLeRPs.dll2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-