a84f2b4e5d9ced8f19cefc1e191308e7201b8ed90ec37bae59e5172e7df11a61

General
Target

a84f2b4e5d9ced8f19cefc1e191308e7201b8ed90ec37bae59e5172e7df11a61.dll

Filesize

574KB

Completed

15-01-2022 01:11

Score
1/10
MD5

48fdd22e03334bb5833aa9973c7ef43e

SHA1

e6084b172252a38f7d23e2165569adfaacb4c0c4

SHA256

a84f2b4e5d9ced8f19cefc1e191308e7201b8ed90ec37bae59e5172e7df11a61

Malware Config
Signatures 1

Filter: none

  • Suspicious use of WriteProcessMemory
    regsvr32.exeregsvr32.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 3676 wrote to memory of 36483676regsvr32.exeregsvr32.exe
    PID 3676 wrote to memory of 36483676regsvr32.exeregsvr32.exe
    PID 3676 wrote to memory of 36483676regsvr32.exeregsvr32.exe
    PID 3648 wrote to memory of 34843648regsvr32.exerundll32.exe
    PID 3648 wrote to memory of 34843648regsvr32.exerundll32.exe
    PID 3648 wrote to memory of 34843648regsvr32.exerundll32.exe
Processes 3
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a84f2b4e5d9ced8f19cefc1e191308e7201b8ed90ec37bae59e5172e7df11a61.dll
    Suspicious use of WriteProcessMemory
    PID:3676
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\a84f2b4e5d9ced8f19cefc1e191308e7201b8ed90ec37bae59e5172e7df11a61.dll
      Suspicious use of WriteProcessMemory
      PID:3648
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\a84f2b4e5d9ced8f19cefc1e191308e7201b8ed90ec37bae59e5172e7df11a61.dll",DllRegisterServer
        PID:3484
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Replay Monitor
                          00:00 00:00
                          Downloads
                          • memory/3484-118-0x0000000000000000-mapping.dmp

                          • memory/3648-115-0x0000000000000000-mapping.dmp

                          • memory/3648-117-0x0000000000775000-0x0000000000776000-memory.dmp

                          • memory/3648-116-0x0000000000751000-0x0000000000775000-memory.dmp