Analysis

  • max time kernel
    150s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2022, 00:38

General

  • Target

    disallowable/hyperbolized.dll

  • Size

    422KB

  • MD5

    6456ce9903d7e0917f577d3caea5dee1

  • SHA1

    4d7b2c4c9745cf579af9f92909a387ab93805b9a

  • SHA256

    45749feb2cc5fc85b002930bd4684fb75708483812fa1801c27a933da918a4c9

  • SHA512

    f01f1dd6aafea72fde2c3b91250e4b562215bec46b5c14ceaf98cea046f82d96963c27c5d91a11d5eabe5de75a4158a62477ffa8a80b35c31f5219854b78fd2c

  • SSDEEP

    12288:eqdD/sblafl4M/8toGXJZ6diNjBo8Ywr6t57AKC:eqdclafl4eGXuiNO8Ye6c

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\disallowable\hyperbolized.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\disallowable\hyperbolized.dll
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\SysWOW64\wermgr.exe
        C:\Windows\SysWOW64\wermgr.exe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1712

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/768-54-0x000007FEFC521000-0x000007FEFC523000-memory.dmp

          Filesize

          8KB

        • memory/1536-56-0x0000000076871000-0x0000000076873000-memory.dmp

          Filesize

          8KB

        • memory/1536-58-0x00000000001C0000-0x00000000001E9000-memory.dmp

          Filesize

          164KB

        • memory/1536-57-0x00000000001C0000-0x00000000001E9000-memory.dmp

          Filesize

          164KB

        • memory/1536-59-0x0000000000150000-0x000000000017B000-memory.dmp

          Filesize

          172KB

        • memory/1536-60-0x00000000001C0000-0x00000000001E9000-memory.dmp

          Filesize

          164KB

        • memory/1536-63-0x00000000001C0000-0x00000000001E9000-memory.dmp

          Filesize

          164KB

        • memory/1712-64-0x0000000000080000-0x00000000000A9000-memory.dmp

          Filesize

          164KB

        • memory/1712-65-0x0000000000080000-0x00000000000A9000-memory.dmp

          Filesize

          164KB