Analysis

  • max time kernel
    152s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 23:50

General

  • Target

    b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409.dll

  • Size

    190KB

  • MD5

    5400467f5b20378cc016ed3710084bf4

  • SHA1

    3d35e52d8463a7429f96e151625fd8314ce44372

  • SHA256

    b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409

  • SHA512

    c21791223de12f7754ed491fb9465e8d7599ac25063aafe81a20bf349373c264f0ba53dddd1a7e9c9f5d11168e320056920184d77ac181541eaa661f9841c6d4

  • SSDEEP

    3072:zKmdbbely43K8U/m11wLFxfsdRQFvxGz0Xt5rS7BvjM38exb6HdlcELLlpENgwJW:zH43K8umrJLSvxG4nrg5MMexCIn6df

Score
1/10

Malware Config

Signatures

  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\b119533251b63c77b0ef16fa1095351da9d1fabe812fa15a406b79905dc8c409.dll
      2⤵
      • Modifies registry class
      PID:4276

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads