Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 03:47

General

  • Target

    f4d14d3870fcbbf85ee3cda9e8778ac28b7ecfad34b938bcabb600f8e8dff705.dll

  • Size

    75KB

  • MD5

    203ae715b4fccdeff2d4a992728c3900

  • SHA1

    5027d73672bbf482ce5fa8b5c7dda5ca4f54f940

  • SHA256

    f4d14d3870fcbbf85ee3cda9e8778ac28b7ecfad34b938bcabb600f8e8dff705

  • SHA512

    3d3ec6f7b99c12e9c1cc2a14ab1a6a9be095dbe4c468648cc9784287f6c53c3a8b7e9099daa9e392aba60a401aec21b0c709bb9d4fdbab66e319d1b95d5d9307

  • SSDEEP

    1536:IcsE2Z4WvwoZiSM2UyyZCDMuDqObVG15+Ntavj7QCDgg:YE2KawoZiNNlZ05DqObSANQL7VDx

Score
1/10

Malware Config

Signatures

  • Modifies registry class 48 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\f4d14d3870fcbbf85ee3cda9e8778ac28b7ecfad34b938bcabb600f8e8dff705.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\f4d14d3870fcbbf85ee3cda9e8778ac28b7ecfad34b938bcabb600f8e8dff705.dll
      2⤵
      • Modifies registry class
      PID:980

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/980-56-0x00000000766D1000-0x00000000766D3000-memory.dmp

          Filesize

          8KB

        • memory/1696-54-0x000007FEFC2F1000-0x000007FEFC2F3000-memory.dmp

          Filesize

          8KB