Analysis

  • max time kernel
    10s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 12:19

General

  • Target

    7aa8ccc46fc67019863031bbb1e7029267d92017f93d0386a6d29a8a495cbbe4.dll

  • Size

    196KB

  • MD5

    e73792847f2bbb41e79cd31afd20926e

  • SHA1

    302a6a15856bac9637a2f620ea1c847f59850d0b

  • SHA256

    7aa8ccc46fc67019863031bbb1e7029267d92017f93d0386a6d29a8a495cbbe4

  • SHA512

    8baf6cc735e9e3c222b31cc25bc8155f21af2b38380dfe6f91e94b72bc3a164e8c269223954a128afb6901bf6d91949c55c898ed890f8febd5ea6b382f405835

  • SSDEEP

    1536:v0mlkRI3qSyStmz4ljnrofEOudeGWKaU0nppvLDRO15Wt6ZZyv58zQCRJWv+2WFl:vHkRTSyStmc3+1U0npxHOROpkeD

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7aa8ccc46fc67019863031bbb1e7029267d92017f93d0386a6d29a8a495cbbe4.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\7aa8ccc46fc67019863031bbb1e7029267d92017f93d0386a6d29a8a495cbbe4.dll
      2⤵
      • Modifies registry class
      PID:940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/940-55-0x0000000000000000-mapping.dmp

  • memory/940-56-0x00000000760A1000-0x00000000760A3000-memory.dmp

    Filesize

    8KB

  • memory/1356-54-0x000007FEFBCE1000-0x000007FEFBCE3000-memory.dmp

    Filesize

    8KB