10488519709c55a8f5c686c998db4e6a0e1f0be67a0b324c18a46480a72daa4b

General
Target

10488519709c55a8f5c686c998db4e6a0e1f0be67a0b324c18a46480a72daa4b.dll

Filesize

574KB

Completed

15-01-2022 01:36

Score
1/10
MD5

d3b076f26ba5bce2057b08cf65f23a84

SHA1

54cbb057fce1eabbb9d65e90e266c9ed9bdab451

SHA256

10488519709c55a8f5c686c998db4e6a0e1f0be67a0b324c18a46480a72daa4b

Malware Config
Signatures 1

Filter: none

  • Suspicious use of WriteProcessMemory
    regsvr32.exeregsvr32.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 2696 wrote to memory of 27002696regsvr32.exeregsvr32.exe
    PID 2696 wrote to memory of 27002696regsvr32.exeregsvr32.exe
    PID 2696 wrote to memory of 27002696regsvr32.exeregsvr32.exe
    PID 2700 wrote to memory of 15802700regsvr32.exerundll32.exe
    PID 2700 wrote to memory of 15802700regsvr32.exerundll32.exe
    PID 2700 wrote to memory of 15802700regsvr32.exerundll32.exe
Processes 3
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\10488519709c55a8f5c686c998db4e6a0e1f0be67a0b324c18a46480a72daa4b.dll
    Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\10488519709c55a8f5c686c998db4e6a0e1f0be67a0b324c18a46480a72daa4b.dll
      Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\10488519709c55a8f5c686c998db4e6a0e1f0be67a0b324c18a46480a72daa4b.dll",DllRegisterServer
        PID:1580
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Replay Monitor
                          00:00 00:00
                          Downloads
                          • memory/1580-118-0x0000000000000000-mapping.dmp

                          • memory/2700-115-0x0000000000000000-mapping.dmp

                          • memory/2700-117-0x0000000004595000-0x0000000004596000-memory.dmp

                          • memory/2700-116-0x0000000004571000-0x0000000004595000-memory.dmp