Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
15-01-2022 01:09
Static task
static1
Behavioral task
behavioral1
Sample
3156cc6407069ebbfd20655fd869972986805ec525287a4f320f83c2517c450d.dll
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
3156cc6407069ebbfd20655fd869972986805ec525287a4f320f83c2517c450d.dll
-
Size
574KB
-
MD5
ebe5f94c3f46923100fcad7393ebddcf
-
SHA1
a56bfc3bd2d0f50a78b0fea09542b2c60f16f27e
-
SHA256
3156cc6407069ebbfd20655fd869972986805ec525287a4f320f83c2517c450d
-
SHA512
7991152525b80554044ccbf7c29727eff4a4811b13ba47682fa084b055bc0b9e2ce8eb431159be47aaeaa34b7e3b856a000e6ac199a81ffe46b23618c7d7e9d6
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 2416 wrote to memory of 2488 2416 regsvr32.exe regsvr32.exe PID 2416 wrote to memory of 2488 2416 regsvr32.exe regsvr32.exe PID 2416 wrote to memory of 2488 2416 regsvr32.exe regsvr32.exe PID 2488 wrote to memory of 2776 2488 regsvr32.exe rundll32.exe PID 2488 wrote to memory of 2776 2488 regsvr32.exe rundll32.exe PID 2488 wrote to memory of 2776 2488 regsvr32.exe rundll32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3156cc6407069ebbfd20655fd869972986805ec525287a4f320f83c2517c450d.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3156cc6407069ebbfd20655fd869972986805ec525287a4f320f83c2517c450d.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\3156cc6407069ebbfd20655fd869972986805ec525287a4f320f83c2517c450d.dll",DllRegisterServer3⤵