Analysis

  • max time kernel
    131s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2022, 23:56

General

  • Target

    b4df58a183807ded6fe63c6a0c751be7cd4cc102a089e2ce1aebd9b72a3f1b37.dll

  • Size

    452KB

  • MD5

    2954e2a662e7b8abaccb530f8bf3512c

  • SHA1

    0ef9eeec288e16cff4f6b5d964a4a31e5b6040d3

  • SHA256

    b4df58a183807ded6fe63c6a0c751be7cd4cc102a089e2ce1aebd9b72a3f1b37

  • SHA512

    d1a5eb06a83262d6eaeb0ef180138e13c19dde990d87d322470ae2c630b2ef3a3233a1a59548f2fd83dca818dd356f7b23c15c378739e6f9162dc21e5eeb275e

  • SSDEEP

    6144:cCNZXrsfqB7V9v23kYRCXeS/NdqvSYeMCoRil+f:cGrsfq1fvyRCOSqSYfRs

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\b4df58a183807ded6fe63c6a0c751be7cd4cc102a089e2ce1aebd9b72a3f1b37.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4364
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\b4df58a183807ded6fe63c6a0c751be7cd4cc102a089e2ce1aebd9b72a3f1b37.dll
      2⤵
      • Modifies registry class
      PID:4064

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads