Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
15-01-2022 01:45
Static task
static1
Behavioral task
behavioral1
Sample
b472f0aa6baac3fa8d59ebf4a30aaddad4feb096a84ae4d8a16ed77c94fb8034.dll
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
b472f0aa6baac3fa8d59ebf4a30aaddad4feb096a84ae4d8a16ed77c94fb8034.dll
-
Size
574KB
-
MD5
dd69de9dd3282a70b37c75a5c17434ee
-
SHA1
e908942137b904fb2ce95a2a8cf3f80804e461ff
-
SHA256
b472f0aa6baac3fa8d59ebf4a30aaddad4feb096a84ae4d8a16ed77c94fb8034
-
SHA512
29547adbcbfd626a2d71ac01684c914452996f2c4164c561864898d3713b0d23d9b8e841641a549e5b570e9988e3670bdcecd080f4d4f37ccf9dd2d7c2c3c916
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 3832 wrote to memory of 2044 3832 regsvr32.exe regsvr32.exe PID 3832 wrote to memory of 2044 3832 regsvr32.exe regsvr32.exe PID 3832 wrote to memory of 2044 3832 regsvr32.exe regsvr32.exe PID 2044 wrote to memory of 2984 2044 regsvr32.exe rundll32.exe PID 2044 wrote to memory of 2984 2044 regsvr32.exe rundll32.exe PID 2044 wrote to memory of 2984 2044 regsvr32.exe rundll32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b472f0aa6baac3fa8d59ebf4a30aaddad4feb096a84ae4d8a16ed77c94fb8034.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b472f0aa6baac3fa8d59ebf4a30aaddad4feb096a84ae4d8a16ed77c94fb8034.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\b472f0aa6baac3fa8d59ebf4a30aaddad4feb096a84ae4d8a16ed77c94fb8034.dll",DllRegisterServer3⤵