Analysis

  • max time kernel
    91s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:36

General

  • Target

    e8fc3d24d22d67b5befa8a43ce074b1d09ec7defa4d0429d0327b3e0bd478644.dll

  • Size

    298KB

  • MD5

    21e52a3c510f824f4bd597ffd1a569a2

  • SHA1

    417d7e1fc6cf3c572e12879a8b312e9f49ee5ec4

  • SHA256

    e8fc3d24d22d67b5befa8a43ce074b1d09ec7defa4d0429d0327b3e0bd478644

  • SHA512

    719ca05d37d59b804e980d2b676e82959964c300c1a53ff58721c0428f114b737f2d3209585e2372ede69f7bcaae6ba6ccf98504c21fee6238915e3f3f1bc5f3

  • SSDEEP

    6144:xNn2sEOLf8yJwkPvWrYaRWvJsqbILMs49QLaaXnEUqftjh:fnf8y7WrSlbkfGORqf/

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e8fc3d24d22d67b5befa8a43ce074b1d09ec7defa4d0429d0327b3e0bd478644.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\e8fc3d24d22d67b5befa8a43ce074b1d09ec7defa4d0429d0327b3e0bd478644.dll
      2⤵
      • Modifies registry class
      PID:4876

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4876-132-0x0000000000000000-mapping.dmp