Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
13-12-2021 12:18
Static task
static1
Behavioral task
behavioral1
Sample
365736ad3b9b9d61c7dd781029250ea2431d147a19d73b1d96a280e54be3f140.bin.dll
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
365736ad3b9b9d61c7dd781029250ea2431d147a19d73b1d96a280e54be3f140.bin.dll
-
Size
462KB
-
MD5
b2cb691bdf1080b1a50ca6449a0d712d
-
SHA1
c9b6e3bd3f7b1c77198c200f610b9ea59be6e350
-
SHA256
365736ad3b9b9d61c7dd781029250ea2431d147a19d73b1d96a280e54be3f140
-
SHA512
cd2cab39be2747df89973c1f6821149bb7d665b2984cf953b2ae9d6e966437493960577013cc59780bf219de13fd95a0d8e80b2a0d662bc4c741a827f7b4b1c3
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 3384 wrote to memory of 4076 3384 regsvr32.exe regsvr32.exe PID 3384 wrote to memory of 4076 3384 regsvr32.exe regsvr32.exe PID 3384 wrote to memory of 4076 3384 regsvr32.exe regsvr32.exe PID 4076 wrote to memory of 720 4076 regsvr32.exe rundll32.exe PID 4076 wrote to memory of 720 4076 regsvr32.exe rundll32.exe PID 4076 wrote to memory of 720 4076 regsvr32.exe rundll32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\365736ad3b9b9d61c7dd781029250ea2431d147a19d73b1d96a280e54be3f140.bin.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\365736ad3b9b9d61c7dd781029250ea2431d147a19d73b1d96a280e54be3f140.bin.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\365736ad3b9b9d61c7dd781029250ea2431d147a19d73b1d96a280e54be3f140.bin.dll",DllRegisterServer3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵