Resubmissions

27/10/2022, 16:05

221027-tjtvtscger 10

24/10/2022, 00:25

221024-aqx2aadegr 1

24/10/2022, 00:25

221024-aqxqhsdec2 1

24/10/2022, 00:24

221024-aqcqcadeb7 1

13/08/2022, 01:18

220813-bn1j3abhdl 1

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24/10/2022, 00:24

General

  • Target

    eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll

  • Size

    437KB

  • MD5

    360417f75090c962adb8021dbb478f67

  • SHA1

    5cd71ee15351c08ff35785774cc18dcaeca871c9

  • SHA256

    eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57

  • SHA512

    62088b203fe1eb61afbded8d64c0c00c682d421f73cbc688122c4e81a95924a648632c40ebf734d8693d5373c89bdbcf33ced5df115616dd96341414b4247390

  • SSDEEP

    12288:MNQGRYLUC/k+JwgIMinOCCdF4F9Bn/TomHe:MNQGRQUC/ZwMO1IFq9BnU

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\system32\cmd.exe
      cmd /c "echo Commands" >> C:\Users\Admin\AppData\Local\Temp\4390.tmp
      2⤵
        PID:1396
      • C:\Windows\system32\cmd.exe
        cmd /c "dir" >> C:\Users\Admin\AppData\Local\Temp\4390.tmp
        2⤵
          PID:1784

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\4390.tmp

              Filesize

              3KB

              MD5

              00d8f103169277561d4451f6bd998c52

              SHA1

              b1d0731a6043d5bae328417e2dffec29aae15135

              SHA256

              50fcde623db62c7d29298607e6c7c7bb84277746704aa9960cf669ae1146d94a

              SHA512

              b9c457277a4708fceb72833d55e56e61e15308ab9a4c1d8bdae74812346f5ecce74737d1fe366b9ac0d670e9a1c756b5d425ea6b36ced1f1da644e26e64e727a

            • C:\Users\Admin\AppData\Local\Temp\4390.tmp

              Filesize

              3KB

              MD5

              00d8f103169277561d4451f6bd998c52

              SHA1

              b1d0731a6043d5bae328417e2dffec29aae15135

              SHA256

              50fcde623db62c7d29298607e6c7c7bb84277746704aa9960cf669ae1146d94a

              SHA512

              b9c457277a4708fceb72833d55e56e61e15308ab9a4c1d8bdae74812346f5ecce74737d1fe366b9ac0d670e9a1c756b5d425ea6b36ced1f1da644e26e64e727a

            • memory/1956-54-0x000007FEFB931000-0x000007FEFB933000-memory.dmp

              Filesize

              8KB

            • memory/1956-55-0x0000000180000000-0x0000000180012000-memory.dmp

              Filesize

              72KB