Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 16:42
Behavioral task
behavioral1
Sample
3e2354b37dcfbcc1b0059cd1dfa87bc2fc3ad4d183a0dbc64768d1a11ee04bdd.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3e2354b37dcfbcc1b0059cd1dfa87bc2fc3ad4d183a0dbc64768d1a11ee04bdd.dll
-
Size
364KB
-
MD5
c8492a0451b8379fcf2d0134a787b79a
-
SHA1
5ee7bc744232d53edd327fdbd8a7a77561857738
-
SHA256
3e2354b37dcfbcc1b0059cd1dfa87bc2fc3ad4d183a0dbc64768d1a11ee04bdd
-
SHA512
3e97bcf4223d3f0b3743069154a072778ce0a41af8a93ac2c4d8fe44cbce9ea9224f1d3d8886c64cb95d42a289cc3ac0ca788ad2e4316f22a55298d92498b4b5
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 624 1672 regsvr32.exe 27 PID 1672 wrote to memory of 624 1672 regsvr32.exe 27 PID 1672 wrote to memory of 624 1672 regsvr32.exe 27 PID 1672 wrote to memory of 624 1672 regsvr32.exe 27 PID 1672 wrote to memory of 624 1672 regsvr32.exe 27 PID 1672 wrote to memory of 624 1672 regsvr32.exe 27 PID 1672 wrote to memory of 624 1672 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3e2354b37dcfbcc1b0059cd1dfa87bc2fc3ad4d183a0dbc64768d1a11ee04bdd.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3e2354b37dcfbcc1b0059cd1dfa87bc2fc3ad4d183a0dbc64768d1a11ee04bdd.dll2⤵PID:624
-