Analysis

  • max time kernel
    149s
  • max time network
    161s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    13-11-2021 17:36

General

  • Target

    7557edd9105983e0a0b91d04ae06cf2966d451859044c7aeac016e1f1ec032bb.dll

  • Size

    76KB

  • MD5

    7f689bf599abbca3c9b84ebb2263690d

  • SHA1

    99faa5b68c9eb97c39dc5f19c25ce8085e285e76

  • SHA256

    7557edd9105983e0a0b91d04ae06cf2966d451859044c7aeac016e1f1ec032bb

  • SHA512

    ddeeac5dc2257d66a6765743bec2f11daf9d1a7a5dfd9e9403b14dba86bfb8853a67d5969f517448e53f94d03b07b6273cc47abbc743bde761ad65e0160ef968

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7557edd9105983e0a0b91d04ae06cf2966d451859044c7aeac016e1f1ec032bb.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\7557edd9105983e0a0b91d04ae06cf2966d451859044c7aeac016e1f1ec032bb.dll
      2⤵
        PID:2732

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads