Analysis

  • max time kernel
    134s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-05-2022 04:07

General

  • Target

    c0f3b27ae4f7db457a86a38244225cca35aa0960eb6a685ed350e99a36c32b61.dll

  • Size

    1.2MB

  • MD5

    a6d49b646ed61b91bcfe9c2170b258cd

  • SHA1

    75c7cdddfbf538f51da8b74cbad11c302206750e

  • SHA256

    c0f3b27ae4f7db457a86a38244225cca35aa0960eb6a685ed350e99a36c32b61

  • SHA512

    18be0707af33a9c4e3b9c57e7c6a3a00b0a249acf606ccb7cc0d968a722637e8bfdc4f7d09da208cd9477ef915fd019ff171df8977c55481093c35d0ccf6a2cc

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\c0f3b27ae4f7db457a86a38244225cca35aa0960eb6a685ed350e99a36c32b61.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\c0f3b27ae4f7db457a86a38244225cca35aa0960eb6a685ed350e99a36c32b61.dll
      2⤵
        PID:4176

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4176-130-0x0000000000000000-mapping.dmp

    • memory/4176-131-0x0000000074F80000-0x00000000750B0000-memory.dmp

      Filesize

      1.2MB