Analysis

  • max time kernel
    141s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    24-09-2021 10:27

General

  • Target

    6f7043b24d9b4c30006781402f0cef2543c8f3e9087d79f6bcff43b1418ad21d.dll

  • Size

    200KB

  • MD5

    d7bf01f9fb24176f2d42d770d79e8c2c

  • SHA1

    9b8eeaf746cd5d903f70c3b245b9466c40b74c5d

  • SHA256

    6f7043b24d9b4c30006781402f0cef2543c8f3e9087d79f6bcff43b1418ad21d

  • SHA512

    0f299b9637c92098eda3a0d27a384e62d9fbaac4a2042cce84f5b1437eea1a17534331931ea5e6a68d79077cefb8678411900165b79fb4040578afaef354ee79

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\6f7043b24d9b4c30006781402f0cef2543c8f3e9087d79f6bcff43b1418ad21d.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\6f7043b24d9b4c30006781402f0cef2543c8f3e9087d79f6bcff43b1418ad21d.dll
      2⤵
        PID:1264

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1264-55-0x0000000000000000-mapping.dmp
    • memory/1264-56-0x0000000075871000-0x0000000075873000-memory.dmp
      Filesize

      8KB

    • memory/2040-54-0x000007FEFB541000-0x000007FEFB543000-memory.dmp
      Filesize

      8KB