Resubmissions
27-10-2022 16:05
221027-tjtvtscger 1024-10-2022 00:25
221024-aqx2aadegr 124-10-2022 00:25
221024-aqxqhsdec2 124-10-2022 00:24
221024-aqcqcadeb7 113-08-2022 01:18
220813-bn1j3abhdl 1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-10-2022 00:25
Static task
static1
Behavioral task
behavioral1
Sample
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll
Resource
win10v2004-20220812-en
General
-
Target
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll
-
Size
437KB
-
MD5
360417f75090c962adb8021dbb478f67
-
SHA1
5cd71ee15351c08ff35785774cc18dcaeca871c9
-
SHA256
eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57
-
SHA512
62088b203fe1eb61afbded8d64c0c00c682d421f73cbc688122c4e81a95924a648632c40ebf734d8693d5373c89bdbcf33ced5df115616dd96341414b4247390
-
SSDEEP
12288:MNQGRYLUC/k+JwgIMinOCCdF4F9Bn/TomHe:MNQGRQUC/ZwMO1IFq9BnU
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1736 wrote to memory of 1124 1736 regsvr32.exe cmd.exe PID 1736 wrote to memory of 1124 1736 regsvr32.exe cmd.exe PID 1736 wrote to memory of 1124 1736 regsvr32.exe cmd.exe PID 1736 wrote to memory of 2024 1736 regsvr32.exe cmd.exe PID 1736 wrote to memory of 2024 1736 regsvr32.exe cmd.exe PID 1736 wrote to memory of 2024 1736 regsvr32.exe cmd.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\eb2564a6f22dcec73dda3b6e4dc5fd37a4fa017f6b98b6dea5ac5b23a44b1f57.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\cmd.execmd /c "echo Commands" >> C:\Users\Admin\AppData\Local\Temp\4D28.tmp2⤵PID:1124
-
-
C:\Windows\system32\cmd.execmd /c "dir" >> C:\Users\Admin\AppData\Local\Temp\4D28.tmp2⤵PID:2024
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50b938e260fe32da9c8fa2d1bc0da18d1
SHA194970f3bc1227b02a474ab733f76f1a610a54a5c
SHA256ca4813786ac2ef66c676c088415bc639bf815bfe4ef5b11fc8bb320a2d63c94d
SHA51256d0e802d9e00df6687d76c2c4cb38429e3a5a695b2bddc2d33e5ec4cc8e08ed2054827cddc7a4df3d8d45649233687b3e0daaba5b7b7ac42b707d3c2c70ac37
-
Filesize
3KB
MD50b938e260fe32da9c8fa2d1bc0da18d1
SHA194970f3bc1227b02a474ab733f76f1a610a54a5c
SHA256ca4813786ac2ef66c676c088415bc639bf815bfe4ef5b11fc8bb320a2d63c94d
SHA51256d0e802d9e00df6687d76c2c4cb38429e3a5a695b2bddc2d33e5ec4cc8e08ed2054827cddc7a4df3d8d45649233687b3e0daaba5b7b7ac42b707d3c2c70ac37