Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
15-01-2022 01:26
Static task
static1
Behavioral task
behavioral1
Sample
4b13c6d7203a13c8178194412560869500dc47b24c8d9bf84356ac47b5c698d2.dll
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
4b13c6d7203a13c8178194412560869500dc47b24c8d9bf84356ac47b5c698d2.dll
-
Size
574KB
-
MD5
fc4b3f10da777483d8aa4bfbd8b789fa
-
SHA1
98fd6c84b23d1fd3370d94abc092d35adca28f48
-
SHA256
4b13c6d7203a13c8178194412560869500dc47b24c8d9bf84356ac47b5c698d2
-
SHA512
3160327e3f4990f68225b2fd8963a8b90c42559d164ac6eefa661eb7a9854910e34deb225bbbbc7df6a8086c9e252c065e0083ec4701f45e3d0ece9463dd3e1d
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 2724 wrote to memory of 3064 2724 regsvr32.exe regsvr32.exe PID 2724 wrote to memory of 3064 2724 regsvr32.exe regsvr32.exe PID 2724 wrote to memory of 3064 2724 regsvr32.exe regsvr32.exe PID 3064 wrote to memory of 2444 3064 regsvr32.exe rundll32.exe PID 3064 wrote to memory of 2444 3064 regsvr32.exe rundll32.exe PID 3064 wrote to memory of 2444 3064 regsvr32.exe rundll32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4b13c6d7203a13c8178194412560869500dc47b24c8d9bf84356ac47b5c698d2.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\4b13c6d7203a13c8178194412560869500dc47b24c8d9bf84356ac47b5c698d2.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\4b13c6d7203a13c8178194412560869500dc47b24c8d9bf84356ac47b5c698d2.dll",DllRegisterServer3⤵