c5dea477d2e029d1d2debe478a1d60533d49a88652f7ffe7e7ea3fa0983b4dbe
General
Target
Filesize
Completed
c5dea477d2e029d1d2debe478a1d60533d49a88652f7ffe7e7ea3fa0983b4dbe.dll
574KB
15-01-2022 01:19
Score
1/10
MD5
SHA1
SHA256
5210374af655542588f7317f80f7d5da
8f262a120075b22ca01ba883d47fcabb7558a6bc
c5dea477d2e029d1d2debe478a1d60533d49a88652f7ffe7e7ea3fa0983b4dbe
Malware Config
Signatures 1
Filter: none
-
Suspicious use of WriteProcessMemoryregsvr32.exeregsvr32.exe
Reported IOCs
description pid process target process PID 3544 wrote to memory of 3796 3544 regsvr32.exe regsvr32.exe PID 3544 wrote to memory of 3796 3544 regsvr32.exe regsvr32.exe PID 3544 wrote to memory of 3796 3544 regsvr32.exe regsvr32.exe PID 3796 wrote to memory of 300 3796 regsvr32.exe rundll32.exe PID 3796 wrote to memory of 300 3796 regsvr32.exe rundll32.exe PID 3796 wrote to memory of 300 3796 regsvr32.exe rundll32.exe
Processes 3
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c5dea477d2e029d1d2debe478a1d60533d49a88652f7ffe7e7ea3fa0983b4dbe.dllSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c5dea477d2e029d1d2debe478a1d60533d49a88652f7ffe7e7ea3fa0983b4dbe.dllSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\c5dea477d2e029d1d2debe478a1d60533d49a88652f7ffe7e7ea3fa0983b4dbe.dll",DllRegisterServer
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
00:00
00:00
Downloads
-
memory/300-118-0x0000000000000000-mapping.dmp
-
memory/3796-115-0x0000000000000000-mapping.dmp
-
memory/3796-116-0x0000000003251000-0x0000000003275000-memory.dmp
-
memory/3796-117-0x0000000003275000-0x0000000003276000-memory.dmp
Title
Loading data