Analysis
-
max time kernel
136s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2022 22:53
Behavioral task
behavioral1
Sample
023b49a872a980cb6c9967e61c773246830f524ca39954050a5c0b4666fce132.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
023b49a872a980cb6c9967e61c773246830f524ca39954050a5c0b4666fce132.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
023b49a872a980cb6c9967e61c773246830f524ca39954050a5c0b4666fce132.dll
-
Size
16KB
-
MD5
1b4cb22373d163b5bea7a36c69a99036
-
SHA1
86a8f056d14ba0a9896b7fa02886c10b8adb85bf
-
SHA256
023b49a872a980cb6c9967e61c773246830f524ca39954050a5c0b4666fce132
-
SHA512
8d13a553bcb6815e65a36cad4f3f3d4ec5e6c098c05f5e5b0043ffc8ecd2fb7f79f0afca3f9565572e15b39e4c0c4272c5c7330346da0e762c7f8aa898651d89
-
SSDEEP
384:NjBiTRsukQJlIepdH5e+NmatwSz1lT6zHc3kSJvhaXD:NVi9uQJlbZtNjtww1lT6Dc3kSJvho
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4500 wrote to memory of 5000 4500 regsvr32.exe 79 PID 4500 wrote to memory of 5000 4500 regsvr32.exe 79 PID 4500 wrote to memory of 5000 4500 regsvr32.exe 79
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\023b49a872a980cb6c9967e61c773246830f524ca39954050a5c0b4666fce132.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\023b49a872a980cb6c9967e61c773246830f524ca39954050a5c0b4666fce132.dll2⤵PID:5000
-