Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 20:37

General

  • Target

    98d12688d18163602bf4fc776eeba56dffb2a82da7daeaf1350425a7b397665d.dll

  • Size

    84KB

  • MD5

    ead94e23e44f67620394f456ed4717d2

  • SHA1

    5690ff2ad6cdf8152aef1432bdc3917f769ce037

  • SHA256

    98d12688d18163602bf4fc776eeba56dffb2a82da7daeaf1350425a7b397665d

  • SHA512

    ec700d9a2d6e7a19a0b5e73d9fbd134d2cf5dbf26e9ba9dbe20a94303384f0db09ed7f2bfe0438c7a543bedfde8c9810e6bf4b1b0dbc6b8f25a3a219649e2d11

  • SSDEEP

    1536:Cjq2qxQL2RqEvfiWpt2wY/UgynXKQ++hVQDfqnjKUMj:Cjq2qxQWlvfiWpt2qgGF+sdKUQ

Score
1/10

Malware Config

Signatures

  • Modifies registry class 14 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\98d12688d18163602bf4fc776eeba56dffb2a82da7daeaf1350425a7b397665d.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\98d12688d18163602bf4fc776eeba56dffb2a82da7daeaf1350425a7b397665d.dll
      2⤵
      • Modifies registry class
      PID:1228

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1228-56-0x0000000076401000-0x0000000076403000-memory.dmp

    Filesize

    8KB

  • memory/1832-54-0x000007FEFC341000-0x000007FEFC343000-memory.dmp

    Filesize

    8KB