Analysis
-
max time kernel
149s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
Details.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Details.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
disallowable/expiated.cmd
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
disallowable/expiated.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
disallowable/footballers.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
disallowable/footballers.dll
Resource
win10v2004-20220901-en
General
-
Target
disallowable/footballers.dll
-
Size
422KB
-
MD5
d4102defbe24aad31449a9790a5c6449
-
SHA1
2ee1bf907aff188094829320ce6cc451772cc49c
-
SHA256
740cdb22935281aa5b7c7171032cab59b7ce678414f7b8804132cf1edad44dbd
-
SHA512
d68bbe4000c48222774c2d426ef2b8927b3b8154567b70c409c4c68cee82496be3a0500eaa0805007a883e90bf94648975a145a88c302457b43907018da99842
-
SSDEEP
12288:eqdD/sblafl4M/8toGXJZ6diNjpo8Ywr6t57AKC:eqdclafl4eGXuiNW8Ye6c
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 692 regsvr32.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe 1748 wermgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 692 regsvr32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1688 wrote to memory of 692 1688 regsvr32.exe 16 PID 1688 wrote to memory of 692 1688 regsvr32.exe 16 PID 1688 wrote to memory of 692 1688 regsvr32.exe 16 PID 1688 wrote to memory of 692 1688 regsvr32.exe 16 PID 1688 wrote to memory of 692 1688 regsvr32.exe 16 PID 1688 wrote to memory of 692 1688 regsvr32.exe 16 PID 1688 wrote to memory of 692 1688 regsvr32.exe 16 PID 692 wrote to memory of 1748 692 regsvr32.exe 28 PID 692 wrote to memory of 1748 692 regsvr32.exe 28 PID 692 wrote to memory of 1748 692 regsvr32.exe 28 PID 692 wrote to memory of 1748 692 regsvr32.exe 28 PID 692 wrote to memory of 1748 692 regsvr32.exe 28 PID 692 wrote to memory of 1748 692 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\disallowable\footballers.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\disallowable\footballers.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\wermgr.exeC:\Windows\SysWOW64\wermgr.exe3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
-