Resubmissions
18/01/2022, 01:59
220118-ceefxafch7 118/01/2022, 01:25
220118-bszhkafad6 1012/01/2022, 19:02
220112-xptnssdgap 1Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
18/01/2022, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
NTn5cqpa.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
NTn5cqpa.dll
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
r5t3fovxD.dll
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
r5t3fovxD.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
wTX6pg5eI.dll
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
wTX6pg5eI.dll
Resource
win10v2004-en-20220113
General
-
Target
r5t3fovxD.dll
-
Size
470KB
-
MD5
3eed9d1f62e0ae2678a708e9aaea2e83
-
SHA1
a30470351ad507f1bf12d11e7c6008f2e821cd98
-
SHA256
da9365e086fb31ed7d832365cf96ffd2697d47f12deb8bf34bd5b1a50870299e
-
SHA512
334a23dca68b451c213c74ff0b8363dafd6de8ac0807999b11c60b00e889f19312629ad842d1a0f3f2c7a65465522905155303055a7ab18709b8d9a4ac781551
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1576 1600 regsvr32.exe 27 PID 1600 wrote to memory of 1576 1600 regsvr32.exe 27 PID 1600 wrote to memory of 1576 1600 regsvr32.exe 27 PID 1600 wrote to memory of 1576 1600 regsvr32.exe 27 PID 1600 wrote to memory of 1576 1600 regsvr32.exe 27 PID 1600 wrote to memory of 1576 1600 regsvr32.exe 27 PID 1600 wrote to memory of 1576 1600 regsvr32.exe 27 PID 1576 wrote to memory of 572 1576 regsvr32.exe 30 PID 1576 wrote to memory of 572 1576 regsvr32.exe 30 PID 1576 wrote to memory of 572 1576 regsvr32.exe 30 PID 1576 wrote to memory of 572 1576 regsvr32.exe 30 PID 1576 wrote to memory of 572 1576 regsvr32.exe 30 PID 1576 wrote to memory of 572 1576 regsvr32.exe 30 PID 1576 wrote to memory of 572 1576 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\r5t3fovxD.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\r5t3fovxD.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\r5t3fovxD.dll",DllRegisterServer3⤵PID:572
-
-