Analysis

  • max time kernel
    21s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2022, 17:44

General

  • Target

    606afd343503dd23c7eb73baee300d5a8346e79b6e11a316baf843478253ff1e.dll

  • Size

    332KB

  • MD5

    0af43acd70b0c953c590946c0da827af

  • SHA1

    3e5e363e3789bedadabc8f73aeffd8cde9d396bf

  • SHA256

    606afd343503dd23c7eb73baee300d5a8346e79b6e11a316baf843478253ff1e

  • SHA512

    e775156826c07e8712b8cd812e7e57bcd0158b84c0c02f53cb425a224d33a9e4c0cd892369b7d34359af2389d6187e3ee0ea9f3314617074ac19149b66b8eeaa

  • SSDEEP

    3072:EXAb6pLQdh+IXSSyDYl1yJksNqJp5AMoejrdVQPIL1Aml5Oy6L0ZaemDti9hBWWh:E+6pXIiSyssepKer2Zml4y6Ms4HoBhq

Score
1/10

Malware Config

Signatures

  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\606afd343503dd23c7eb73baee300d5a8346e79b6e11a316baf843478253ff1e.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\606afd343503dd23c7eb73baee300d5a8346e79b6e11a316baf843478253ff1e.dll
      2⤵
      • Modifies registry class
      PID:1832

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1032-54-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp

    Filesize

    8KB

  • memory/1832-56-0x0000000075601000-0x0000000075603000-memory.dmp

    Filesize

    8KB