Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
36b35d811347138d0ba40434f0c70f4c4cee3c066109a314202a453638854abe.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
36b35d811347138d0ba40434f0c70f4c4cee3c066109a314202a453638854abe.dll
Resource
win10v2004-20220812-en
General
-
Target
36b35d811347138d0ba40434f0c70f4c4cee3c066109a314202a453638854abe.dll
-
Size
66KB
-
MD5
60106b27fcce3e71ec8c8c757cc243e4
-
SHA1
19088a5152cf0e6afe98a0ba311259dc14f0dba2
-
SHA256
36b35d811347138d0ba40434f0c70f4c4cee3c066109a314202a453638854abe
-
SHA512
748f7f0fd456944ebcf6cd98674789e26a97e9f68299f5f41796d4ea47f03f4837115629db8be359cc2e4071838754f43d14f5064ebc92dda6e3ea211b34ee0e
-
SSDEEP
1536:rE83/nUoNQFeetxt4Ye3h9vvQuOdrGpKsHdx2yyQQyyyy77P:rE83/6Fntxnex2u6rGpKs9DCL
Malware Config
Signatures
-
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7325c922-bb81-47b0-8b2f-a5f8605e242f}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7325c922-bb81-47b0-8b2f-a5f8605e242f}\DefaultIcon\ = "%SystemRoot%\\SysWow64\\srclient.dll,0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432Node\CLSID\{a47401f6-a8a6-40ea-9c29-b8f6026c98b8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a47401f6-a8a6-40ea-9c29-b8f6026c98b8}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a47401f6-a8a6-40ea-9c29-b8f6026c98b8}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432Node\CLSID\{7325c922-bb81-47b0-8b2f-a5f8605e242f} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7325c922-bb81-47b0-8b2f-a5f8605e242f}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7325c922-bb81-47b0-8b2f-a5f8605e242f}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\36b35d811347138d0ba40434f0c70f4c4cee3c066109a314202a453638854abe.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7325c922-bb81-47b0-8b2f-a5f8605e242f}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7325c922-bb81-47b0-8b2f-a5f8605e242f}\DefaultIcon regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a47401f6-a8a6-40ea-9c29-b8f6026c98b8}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a47401f6-a8a6-40ea-9c29-b8f6026c98b8}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\36b35d811347138d0ba40434f0c70f4c4cee3c066109a314202a453638854abe.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4076 wrote to memory of 2256 4076 regsvr32.exe 81 PID 4076 wrote to memory of 2256 4076 regsvr32.exe 81 PID 4076 wrote to memory of 2256 4076 regsvr32.exe 81
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\36b35d811347138d0ba40434f0c70f4c4cee3c066109a314202a453638854abe.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\36b35d811347138d0ba40434f0c70f4c4cee3c066109a314202a453638854abe.dll2⤵
- Modifies registry class
PID:2256
-