Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    15-01-2022 01:16

General

  • Target

    e04d4c9874bdaccc55cb8a43e93e35b14613ea76a87e535b6a3d5c33efbd5b83.dll

  • Size

    574KB

  • MD5

    34851b7bb1d60b509d9678ee5cea3169

  • SHA1

    cc6f13be11d4bc51d09d79d30d9586ebe21d59b3

  • SHA256

    e04d4c9874bdaccc55cb8a43e93e35b14613ea76a87e535b6a3d5c33efbd5b83

  • SHA512

    b22641ef2cbe95250a9d0d16ec03e43469fab5bf11cdf1dd4a83f4851252c6407b6b68b9a818ce3b6d414ec6f73bb64778c42fa4d97a0c2e951429a2e64e0fd4

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e04d4c9874bdaccc55cb8a43e93e35b14613ea76a87e535b6a3d5c33efbd5b83.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\e04d4c9874bdaccc55cb8a43e93e35b14613ea76a87e535b6a3d5c33efbd5b83.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3972
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\e04d4c9874bdaccc55cb8a43e93e35b14613ea76a87e535b6a3d5c33efbd5b83.dll",DllRegisterServer
        3⤵
          PID:1136

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1136-118-0x0000000000000000-mapping.dmp
    • memory/3972-115-0x0000000000000000-mapping.dmp
    • memory/3972-116-0x0000000002B81000-0x0000000002BA5000-memory.dmp
      Filesize

      144KB

    • memory/3972-117-0x0000000002BA5000-0x0000000002BA6000-memory.dmp
      Filesize

      4KB