Resubmissions
17-07-2022 06:21
220717-g4d9nagdb5 10Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220715-en -
resource tags
arch:x64arch:x86image:win10v2004-20220715-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2022 06:21
Behavioral task
behavioral1
Sample
malware.dll
Resource
win7-20220715-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
malware.dll
Resource
win10v2004-20220715-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
malware.dll
-
Size
244KB
-
MD5
df1b0f2d8e1c9ff27a9b0eb50d0967ef
-
SHA1
fdd07c89c8ed656964dfa1a6cff271e170eda0c2
-
SHA256
f9495e968f9a1610c0cf9383053e5b5696ecc85ca3ca2a338c24c7204cc93881
-
SHA512
1310c467da1c30e1693b459102308e07aa755bec61423ae1e5a48b8313ebd24ff411b790f26b591b19d815e247d2c504f864fd73f9e0fd0bbb17917278f16d9a
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4668 wrote to memory of 3460 4668 regsvr32.exe regsvr32.exe PID 4668 wrote to memory of 3460 4668 regsvr32.exe regsvr32.exe PID 4668 wrote to memory of 3460 4668 regsvr32.exe regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3460-130-0x0000000000000000-mapping.dmp