Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 17:38
Behavioral task
behavioral1
Sample
3e5a6834cf6192a987ca9b0b4c8cb9202660e399ebe387af8c7407b12ae2da63.dll
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3e5a6834cf6192a987ca9b0b4c8cb9202660e399ebe387af8c7407b12ae2da63.dll
Resource
win10v2004-20220901-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
3e5a6834cf6192a987ca9b0b4c8cb9202660e399ebe387af8c7407b12ae2da63.dll
-
Size
790KB
-
MD5
1d6aa29e98d3f54b8c891929c34eb426
-
SHA1
ceca1a691c736632b3e98f2ed5b028d33c0f3c64
-
SHA256
3e5a6834cf6192a987ca9b0b4c8cb9202660e399ebe387af8c7407b12ae2da63
-
SHA512
58eb6150dde73277e06b5e27e102a8ad183978937133394656fcf68a2cc20d84cf5f554225af65d8cfa8d3a51b0b8f096b52afec9d1417b0ecedd499adda4896
-
SSDEEP
12288:b/8j+2vE6ywjfSUbMdkbtqpVGA5Sb15NAKtOWzm4w8Qa79fz:b/mpvWkBqjkhHm5ax
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1752 1464 regsvr32.exe 27 PID 1464 wrote to memory of 1752 1464 regsvr32.exe 27 PID 1464 wrote to memory of 1752 1464 regsvr32.exe 27 PID 1464 wrote to memory of 1752 1464 regsvr32.exe 27 PID 1464 wrote to memory of 1752 1464 regsvr32.exe 27 PID 1464 wrote to memory of 1752 1464 regsvr32.exe 27 PID 1464 wrote to memory of 1752 1464 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3e5a6834cf6192a987ca9b0b4c8cb9202660e399ebe387af8c7407b12ae2da63.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3e5a6834cf6192a987ca9b0b4c8cb9202660e399ebe387af8c7407b12ae2da63.dll2⤵PID:1752
-