Analysis

  • max time kernel
    2s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 23:50

General

  • Target

    b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409.dll

  • Size

    190KB

  • MD5

    5400467f5b20378cc016ed3710084bf4

  • SHA1

    3d35e52d8463a7429f96e151625fd8314ce44372

  • SHA256

    b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409

  • SHA512

    c21791223de12f7754ed491fb9465e8d7599ac25063aafe81a20bf349373c264f0ba53dddd1a7e9c9f5d11168e320056920184d77ac181541eaa661f9841c6d4

  • SSDEEP

    3072:zKmdbbely43K8U/m11wLFxfsdRQFvxGz0Xt5rS7BvjM38exb6HdlcELLlpENgwJW:zH43K8umrJLSvxG4nrg5MMexCIn6df

Score
1/10

Malware Config

Signatures

  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409.dll
      2⤵
      • Modifies registry class
      PID:940

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/940-56-0x00000000753F1000-0x00000000753F3000-memory.dmp

          Filesize

          8KB

        • memory/2028-54-0x000007FEFB881000-0x000007FEFB883000-memory.dmp

          Filesize

          8KB