Analysis

  • max time kernel
    154s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 03:47

General

  • Target

    f4d14d3870fcbbf85ee3cda9e8778ac28b7ecfad34b938bcabb600f8e8dff705.dll

  • Size

    75KB

  • MD5

    203ae715b4fccdeff2d4a992728c3900

  • SHA1

    5027d73672bbf482ce5fa8b5c7dda5ca4f54f940

  • SHA256

    f4d14d3870fcbbf85ee3cda9e8778ac28b7ecfad34b938bcabb600f8e8dff705

  • SHA512

    3d3ec6f7b99c12e9c1cc2a14ab1a6a9be095dbe4c468648cc9784287f6c53c3a8b7e9099daa9e392aba60a401aec21b0c709bb9d4fdbab66e319d1b95d5d9307

  • SSDEEP

    1536:IcsE2Z4WvwoZiSM2UyyZCDMuDqObVG15+Ntavj7QCDgg:YE2KawoZiNNlZ05DqObSANQL7VDx

Score
1/10

Malware Config

Signatures

  • Modifies registry class 48 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\f4d14d3870fcbbf85ee3cda9e8778ac28b7ecfad34b938bcabb600f8e8dff705.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:984
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\f4d14d3870fcbbf85ee3cda9e8778ac28b7ecfad34b938bcabb600f8e8dff705.dll
      2⤵
      • Modifies registry class
      PID:2188

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads