Resubmissions
18-01-2022 01:59
220118-ceefxafch7 118-01-2022 01:25
220118-bszhkafad6 1012-01-2022 19:02
220112-xptnssdgap 1Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-01-2022 19:02
Static task
static1
Behavioral task
behavioral1
Sample
NTn5cqpa.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
NTn5cqpa.dll
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
r5t3fovxD.dll
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
r5t3fovxD.dll
Resource
win10-en-20211208
Behavioral task
behavioral5
Sample
wTX6pg5eI.dll
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
wTX6pg5eI.dll
Resource
win10-en-20211208
General
-
Target
r5t3fovxD.dll
-
Size
470KB
-
MD5
3eed9d1f62e0ae2678a708e9aaea2e83
-
SHA1
a30470351ad507f1bf12d11e7c6008f2e821cd98
-
SHA256
da9365e086fb31ed7d832365cf96ffd2697d47f12deb8bf34bd5b1a50870299e
-
SHA512
334a23dca68b451c213c74ff0b8363dafd6de8ac0807999b11c60b00e889f19312629ad842d1a0f3f2c7a65465522905155303055a7ab18709b8d9a4ac781551
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid Process procid_target PID 964 wrote to memory of 1720 964 regsvr32.exe 27 PID 964 wrote to memory of 1720 964 regsvr32.exe 27 PID 964 wrote to memory of 1720 964 regsvr32.exe 27 PID 964 wrote to memory of 1720 964 regsvr32.exe 27 PID 964 wrote to memory of 1720 964 regsvr32.exe 27 PID 964 wrote to memory of 1720 964 regsvr32.exe 27 PID 964 wrote to memory of 1720 964 regsvr32.exe 27 PID 1720 wrote to memory of 1796 1720 regsvr32.exe 28 PID 1720 wrote to memory of 1796 1720 regsvr32.exe 28 PID 1720 wrote to memory of 1796 1720 regsvr32.exe 28 PID 1720 wrote to memory of 1796 1720 regsvr32.exe 28 PID 1720 wrote to memory of 1796 1720 regsvr32.exe 28 PID 1720 wrote to memory of 1796 1720 regsvr32.exe 28 PID 1720 wrote to memory of 1796 1720 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\r5t3fovxD.dll1⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\r5t3fovxD.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\r5t3fovxD.dll",DllRegisterServer3⤵PID:1796
-
-