Resubmissions

27-10-2022 16:05

221027-tjtvtscger 10

24-10-2022 00:25

221024-aqx2aadegr 1

24-10-2022 00:25

221024-aqxqhsdec2 1

24-10-2022 00:24

221024-aqcqcadeb7 1

13-08-2022 01:18

220813-bn1j3abhdl 1

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-10-2022 00:24

General

  • Target

    eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll

  • Size

    437KB

  • MD5

    360417f75090c962adb8021dbb478f67

  • SHA1

    5cd71ee15351c08ff35785774cc18dcaeca871c9

  • SHA256

    eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57

  • SHA512

    62088b203fe1eb61afbded8d64c0c00c682d421f73cbc688122c4e81a95924a648632c40ebf734d8693d5373c89bdbcf33ced5df115616dd96341414b4247390

  • SSDEEP

    12288:MNQGRYLUC/k+JwgIMinOCCdF4F9Bn/TomHe:MNQGRQUC/ZwMO1IFq9BnU

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\system32\cmd.exe
      cmd /c "echo Commands" >> C:\Users\Admin\AppData\Local\Temp\4390.tmp
      2⤵
        PID:1396
      • C:\Windows\system32\cmd.exe
        cmd /c "dir" >> C:\Users\Admin\AppData\Local\Temp\4390.tmp
        2⤵
          PID:1784

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\4390.tmp
        Filesize

        3KB

        MD5

        00d8f103169277561d4451f6bd998c52

        SHA1

        b1d0731a6043d5bae328417e2dffec29aae15135

        SHA256

        50fcde623db62c7d29298607e6c7c7bb84277746704aa9960cf669ae1146d94a

        SHA512

        b9c457277a4708fceb72833d55e56e61e15308ab9a4c1d8bdae74812346f5ecce74737d1fe366b9ac0d670e9a1c756b5d425ea6b36ced1f1da644e26e64e727a

      • C:\Users\Admin\AppData\Local\Temp\4390.tmp
        Filesize

        3KB

        MD5

        00d8f103169277561d4451f6bd998c52

        SHA1

        b1d0731a6043d5bae328417e2dffec29aae15135

        SHA256

        50fcde623db62c7d29298607e6c7c7bb84277746704aa9960cf669ae1146d94a

        SHA512

        b9c457277a4708fceb72833d55e56e61e15308ab9a4c1d8bdae74812346f5ecce74737d1fe366b9ac0d670e9a1c756b5d425ea6b36ced1f1da644e26e64e727a

      • memory/1396-60-0x0000000000000000-mapping.dmp
      • memory/1784-61-0x0000000000000000-mapping.dmp
      • memory/1956-54-0x000007FEFB931000-0x000007FEFB933000-memory.dmp
        Filesize

        8KB

      • memory/1956-55-0x0000000180000000-0x0000000180012000-memory.dmp
        Filesize

        72KB