Resubmissions
18/01/2022, 01:59
220118-ceefxafch7 118/01/2022, 01:25
220118-bszhkafad6 1012/01/2022, 19:02
220112-xptnssdgap 1Analysis
-
max time kernel
118s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12/01/2022, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
NTn5cqpa.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
NTn5cqpa.dll
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
r5t3fovxD.dll
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
r5t3fovxD.dll
Resource
win10-en-20211208
Behavioral task
behavioral5
Sample
wTX6pg5eI.dll
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
wTX6pg5eI.dll
Resource
win10-en-20211208
General
-
Target
NTn5cqpa.dll
-
Size
470KB
-
MD5
e4b28480c44a175190085a79e50aa56c
-
SHA1
3e43969468de455940920664b28cc0c8139924b6
-
SHA256
c60f319790c8cf0b2f39046c789428771ed2bf8f4c108d9b6e9c9bf024efd3c2
-
SHA512
2dfaa66429f27de1a8b86e693f2776eae593b671d1ae385ed3389e7ff528b4582e6a6695474123febfc34749c9aa2308c2b90b5c43bd41cd1d88a5e0a4b12964
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1560 wrote to memory of 1052 1560 regsvr32.exe 27 PID 1560 wrote to memory of 1052 1560 regsvr32.exe 27 PID 1560 wrote to memory of 1052 1560 regsvr32.exe 27 PID 1560 wrote to memory of 1052 1560 regsvr32.exe 27 PID 1560 wrote to memory of 1052 1560 regsvr32.exe 27 PID 1560 wrote to memory of 1052 1560 regsvr32.exe 27 PID 1560 wrote to memory of 1052 1560 regsvr32.exe 27 PID 1052 wrote to memory of 1752 1052 regsvr32.exe 30 PID 1052 wrote to memory of 1752 1052 regsvr32.exe 30 PID 1052 wrote to memory of 1752 1052 regsvr32.exe 30 PID 1052 wrote to memory of 1752 1052 regsvr32.exe 30 PID 1052 wrote to memory of 1752 1052 regsvr32.exe 30 PID 1052 wrote to memory of 1752 1052 regsvr32.exe 30 PID 1052 wrote to memory of 1752 1052 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\NTn5cqpa.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\NTn5cqpa.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\NTn5cqpa.dll",DllRegisterServer3⤵PID:1752
-
-