Resubmissions
27-10-2022 16:05
221027-tjtvtscger 1024-10-2022 00:25
221024-aqx2aadegr 124-10-2022 00:25
221024-aqxqhsdec2 124-10-2022 00:24
221024-aqcqcadeb7 113-08-2022 01:18
220813-bn1j3abhdl 1Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-10-2022 00:24
Static task
static1
Behavioral task
behavioral1
Sample
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll
Resource
win10v2004-20220901-en
General
-
Target
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll
-
Size
437KB
-
MD5
360417f75090c962adb8021dbb478f67
-
SHA1
5cd71ee15351c08ff35785774cc18dcaeca871c9
-
SHA256
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57
-
SHA512
62088b203fe1eb61afbded8d64c0c00c682d421f73cbc688122c4e81a95924a648632c40ebf734d8693d5373c89bdbcf33ced5df115616dd96341414b4247390
-
SSDEEP
12288:MNQGRYLUC/k+JwgIMinOCCdF4F9Bn/TomHe:MNQGRQUC/ZwMO1IFq9BnU
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1396 1956 regsvr32.exe 27 PID 1956 wrote to memory of 1396 1956 regsvr32.exe 27 PID 1956 wrote to memory of 1396 1956 regsvr32.exe 27 PID 1956 wrote to memory of 1784 1956 regsvr32.exe 29 PID 1956 wrote to memory of 1784 1956 regsvr32.exe 29 PID 1956 wrote to memory of 1784 1956 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\system32\cmd.execmd /c "echo Commands" >> C:\Users\Admin\AppData\Local\Temp\4390.tmp2⤵PID:1396
-
-
C:\Windows\system32\cmd.execmd /c "dir" >> C:\Users\Admin\AppData\Local\Temp\4390.tmp2⤵PID:1784
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD500d8f103169277561d4451f6bd998c52
SHA1b1d0731a6043d5bae328417e2dffec29aae15135
SHA25650fcde623db62c7d29298607e6c7c7bb84277746704aa9960cf669ae1146d94a
SHA512b9c457277a4708fceb72833d55e56e61e15308ab9a4c1d8bdae74812346f5ecce74737d1fe366b9ac0d670e9a1c756b5d425ea6b36ced1f1da644e26e64e727a
-
Filesize
3KB
MD500d8f103169277561d4451f6bd998c52
SHA1b1d0731a6043d5bae328417e2dffec29aae15135
SHA25650fcde623db62c7d29298607e6c7c7bb84277746704aa9960cf669ae1146d94a
SHA512b9c457277a4708fceb72833d55e56e61e15308ab9a4c1d8bdae74812346f5ecce74737d1fe366b9ac0d670e9a1c756b5d425ea6b36ced1f1da644e26e64e727a