Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
30-11-2021 11:31
Behavioral task
behavioral1
Sample
61a60b201df7d.dll
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
61a60b201df7d.dll
Resource
win10-en-20211104
windows10_x64
0 signatures
0 seconds
General
-
Target
61a60b201df7d.dll
-
Size
42KB
-
MD5
2bd6e4dddd6dfd7fe24514576f47068c
-
SHA1
588cc4fea13fe49d361468dac070e8c2da615e12
-
SHA256
a6f0ad440063e4aab5a6eab256ead56e4cd9594bc34dcdb273d89dca0f7032d1
-
SHA512
4a5a1434ffed65c604fa4b401edbdb33a9cfd2fdf0229ea8cd8db9b6d1c82203f4bb48248c2c90b5eb76a9eb886830780bb80060d0d1bd3fdb93f258346bfaf0
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3616 wrote to memory of 4044 3616 regsvr32.exe regsvr32.exe PID 3616 wrote to memory of 4044 3616 regsvr32.exe regsvr32.exe PID 3616 wrote to memory of 4044 3616 regsvr32.exe regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4044-118-0x0000000000000000-mapping.dmp