Analysis

  • max time kernel
    81s
  • max time network
    119s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    15-01-2022 01:33

General

  • Target

    eb3602de7c6ed736c9260ed6871f85b56e66f2eca35f16660fbc0a85f8b0a7cf.dll

  • Size

    574KB

  • MD5

    93897c622412b3a6338def5a7a9ae449

  • SHA1

    aefa69edf47dc93a805a1707c2e182fc1ad11308

  • SHA256

    eb3602de7c6ed736c9260ed6871f85b56e66f2eca35f16660fbc0a85f8b0a7cf

  • SHA512

    2e37ed2a6fc30edb4ac2314694ae63df323e618aa1294a8d8910155f06471561c46fb21a84e69419201d90c7bf50b998cf8c23be4481ebb934c4a584427908a6

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\eb3602de7c6ed736c9260ed6871f85b56e66f2eca35f16660fbc0a85f8b0a7cf.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\eb3602de7c6ed736c9260ed6871f85b56e66f2eca35f16660fbc0a85f8b0a7cf.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3348
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\eb3602de7c6ed736c9260ed6871f85b56e66f2eca35f16660fbc0a85f8b0a7cf.dll",DllRegisterServer
        3⤵
          PID:1184

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1184-118-0x0000000000000000-mapping.dmp
    • memory/3348-115-0x0000000000000000-mapping.dmp
    • memory/3348-117-0x0000000004A55000-0x0000000004A56000-memory.dmp
      Filesize

      4KB

    • memory/3348-116-0x0000000004A31000-0x0000000004A55000-memory.dmp
      Filesize

      144KB