Analysis

  • max time kernel
    141s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 07:31

General

  • Target

    hyword/hyword/msvbvm60.dll

  • Size

    1.3MB

  • MD5

    62c6c1ed346b2478f6833f0358f51026

  • SHA1

    f0115cef6474ea41d5bc124544516854daf13de4

  • SHA256

    46467c73fb928256fda19260d11ac3d228cb4f33d145ac7bf05505075c43a989

  • SHA512

    dd54cc78cbc38394a74a412c3e526f5781603373e480b303256528e6c6b4aa86573a9eecdce018d3a27226f9aaa538fe0ed72299ccff5c3c93817f11fcd2eb90

  • SSDEEP

    24576:ycOPu8lodWFF9V/zNItUSGmtcuyNiUqH/vWOO1G6fUG+VO7HDF4DB2sjhsJGJ:lwu82WFFvmt3yNiUqH/vbf6fUG+OjeDn

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\hyword\hyword\msvbvm60.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\hyword\hyword\msvbvm60.dll
      2⤵
      • Modifies registry class
      PID:396

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/396-132-0x0000000000000000-mapping.dmp