Resubmissions
18/01/2022, 01:59
220118-ceefxafch7 118/01/2022, 01:25
220118-bszhkafad6 1012/01/2022, 19:02
220112-xptnssdgap 1Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
18/01/2022, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
NTn5cqpa.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
NTn5cqpa.dll
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
r5t3fovxD.dll
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
r5t3fovxD.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
wTX6pg5eI.dll
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
wTX6pg5eI.dll
Resource
win10v2004-en-20220113
General
-
Target
NTn5cqpa.dll
-
Size
470KB
-
MD5
e4b28480c44a175190085a79e50aa56c
-
SHA1
3e43969468de455940920664b28cc0c8139924b6
-
SHA256
c60f319790c8cf0b2f39046c789428771ed2bf8f4c108d9b6e9c9bf024efd3c2
-
SHA512
2dfaa66429f27de1a8b86e693f2776eae593b671d1ae385ed3389e7ff528b4582e6a6695474123febfc34749c9aa2308c2b90b5c43bd41cd1d88a5e0a4b12964
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1084 wrote to memory of 744 1084 regsvr32.exe 27 PID 1084 wrote to memory of 744 1084 regsvr32.exe 27 PID 1084 wrote to memory of 744 1084 regsvr32.exe 27 PID 1084 wrote to memory of 744 1084 regsvr32.exe 27 PID 1084 wrote to memory of 744 1084 regsvr32.exe 27 PID 1084 wrote to memory of 744 1084 regsvr32.exe 27 PID 1084 wrote to memory of 744 1084 regsvr32.exe 27 PID 744 wrote to memory of 532 744 regsvr32.exe 29 PID 744 wrote to memory of 532 744 regsvr32.exe 29 PID 744 wrote to memory of 532 744 regsvr32.exe 29 PID 744 wrote to memory of 532 744 regsvr32.exe 29 PID 744 wrote to memory of 532 744 regsvr32.exe 29 PID 744 wrote to memory of 532 744 regsvr32.exe 29 PID 744 wrote to memory of 532 744 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\NTn5cqpa.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\NTn5cqpa.dll2⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\NTn5cqpa.dll",DllRegisterServer3⤵PID:532
-
-