Analysis

  • max time kernel
    147s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 15:47

General

  • Target

    b20e9abcefe0bdb584e490699ffd70b39c20eebbb57ac89093ede36de8aefffa.dll

  • Size

    228KB

  • MD5

    0fbc803d366d03a0c0a14dcb15eb5d3a

  • SHA1

    bd7aa65acc6a45e8d6b3b720754236051f493c08

  • SHA256

    b20e9abcefe0bdb584e490699ffd70b39c20eebbb57ac89093ede36de8aefffa

  • SHA512

    cb030f7c44a7d6de9eb260f6082a9ea95ae9285bd67b6b82f23dafb97b00b30629f3182f16dc5ce825773c3a6a99d29144eea9967c69696ceaa8018e191f1afd

  • SSDEEP

    3072:UZ3t5zzkSu/LoGQPYZBbPUYhxpO+kpOpp0GqSDGIn6bO5AaCn95X1E/kjk:0va0YZBbPUYvFBCGqSD1nw9V1Eq

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\b20e9abcefe0bdb584e490699ffd70b39c20eebbb57ac89093ede36de8aefffa.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3868
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\b20e9abcefe0bdb584e490699ffd70b39c20eebbb57ac89093ede36de8aefffa.dll
      2⤵
      • Modifies registry class
      PID:1180

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1180-133-0x0000000010000000-0x000000001003B000-memory.dmp

          Filesize

          236KB