Resubmissions
27-10-2022 16:05
221027-tjtvtscger 1024-10-2022 00:25
221024-aqx2aadegr 124-10-2022 00:25
221024-aqxqhsdec2 124-10-2022 00:24
221024-aqcqcadeb7 113-08-2022 01:18
220813-bn1j3abhdl 1Analysis
-
max time kernel
291s -
max time network
297s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-10-2022 00:25
Static task
static1
Behavioral task
behavioral1
Sample
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll
Resource
win10v2004-20220901-en
General
-
Target
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll
-
Size
437KB
-
MD5
360417f75090c962adb8021dbb478f67
-
SHA1
5cd71ee15351c08ff35785774cc18dcaeca871c9
-
SHA256
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57
-
SHA512
62088b203fe1eb61afbded8d64c0c00c682d421f73cbc688122c4e81a95924a648632c40ebf734d8693d5373c89bdbcf33ced5df115616dd96341414b4247390
-
SSDEEP
12288:MNQGRYLUC/k+JwgIMinOCCdF4F9Bn/TomHe:MNQGRQUC/ZwMO1IFq9BnU
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1088 wrote to memory of 1936 1088 regsvr32.exe cmd.exe PID 1088 wrote to memory of 1936 1088 regsvr32.exe cmd.exe PID 1088 wrote to memory of 1936 1088 regsvr32.exe cmd.exe PID 1088 wrote to memory of 1760 1088 regsvr32.exe cmd.exe PID 1088 wrote to memory of 1760 1088 regsvr32.exe cmd.exe PID 1088 wrote to memory of 1760 1088 regsvr32.exe cmd.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\cmd.execmd /c "echo Commands" >> C:\Users\Admin\AppData\Local\Temp\CEB8.tmp2⤵PID:1936
-
-
C:\Windows\system32\cmd.execmd /c "dir" >> C:\Users\Admin\AppData\Local\Temp\CEB8.tmp2⤵PID:1760
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11B
MD5a67f2061c697fd95f6b28d89b953a51f
SHA16730b864104f0840fcebf04383d2e3ef7c324a48
SHA256d4bdd82a900fea52cbd442ce8cae201982392d3533d765bfceb7682bc2d16a79
SHA512d9cc7c1593967dbcaf358bc9d394426d97baa7bb6ddeed1767b638c85aa814276eaa3609588b720cab3b2a0b3e36d1d3833dab3e75c9c1a92b8315db61a64cbe
-
Filesize
3KB
MD55b47da1df30711fecec28c359067d656
SHA1be1f35d16c2743eccfa4338dbf059870d5544f0c
SHA256542121f202d60686f44953be903bb0a940e377a23c98e5f4896dd450d2ae583a
SHA512f924e5c1101702c82f78a0d27cc33520597f0d539f1d918b8164f642c20f15d2ec51f4925ed6d006cf26378577c2a0a8b302ba6655d4b24fdf88176a5162169f