Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 11:01
Static task
static1
Behavioral task
behavioral1
Sample
4a3f719a6d2b6d54e1ed711198c4905ad33fb473e66767cc4bed976424611437.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a3f719a6d2b6d54e1ed711198c4905ad33fb473e66767cc4bed976424611437.dll
Resource
win10v2004-20220812-en
General
-
Target
4a3f719a6d2b6d54e1ed711198c4905ad33fb473e66767cc4bed976424611437.dll
-
Size
315KB
-
MD5
309a6b21816cd94fe410bf0181525440
-
SHA1
200d7d39d8fca31ed18f19c45946588ccb95f509
-
SHA256
4a3f719a6d2b6d54e1ed711198c4905ad33fb473e66767cc4bed976424611437
-
SHA512
c6ff22879ad566cc17c8390ab272f4836a2c48db44b1a6df5c9c063fa22c9ee5a305083fcbee58b509c917f3afadf3a6e8cf484e80590e274f2fd463366dc08f
-
SSDEEP
6144:5+9JrUS0oFZ9ES6RSRHsvfjp8PYLeB8l9gqXrC:5+DrUY3eMRHsH2mi8l9gqXr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4832 wrote to memory of 3436 4832 regsvr32.exe 80 PID 4832 wrote to memory of 3436 4832 regsvr32.exe 80 PID 4832 wrote to memory of 3436 4832 regsvr32.exe 80
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4a3f719a6d2b6d54e1ed711198c4905ad33fb473e66767cc4bed976424611437.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\4a3f719a6d2b6d54e1ed711198c4905ad33fb473e66767cc4bed976424611437.dll2⤵PID:3436
-