Analysis

  • max time kernel
    106s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 15:38

General

  • Target

    9770f6bb106a63b0b579306aad61454323b49da47cfc7df5e8bfc532a981bcaa.dll

  • Size

    188KB

  • MD5

    79cec5f67c6f05fc50d75ac4ca93259e

  • SHA1

    1a351b878e0b334edfe5a55b82c1eee3e3ffede6

  • SHA256

    9770f6bb106a63b0b579306aad61454323b49da47cfc7df5e8bfc532a981bcaa

  • SHA512

    073888c48cba9e75f87d563cad786ba0fe68c415cb85513ea5888fc6c687f2a2c1f587567b74870b22b720bce3dee742429dbd4b2d0c9334bb54eb6c4e941e35

  • SSDEEP

    3072:LLEYStmB1shXfintM0Wa8HTmCJymG6QDiZGoPAn0d/YHYKr0d8YLiVQNFeezXUW:nEYwfIM0WtTzJyNOXUWQwNJ1

Score
1/10

Malware Config

Signatures

  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\9770f6bb106a63b0b579306aad61454323b49da47cfc7df5e8bfc532a981bcaa.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\9770f6bb106a63b0b579306aad61454323b49da47cfc7df5e8bfc532a981bcaa.dll
      2⤵
      • Modifies registry class
      PID:2324

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2324-132-0x0000000000000000-mapping.dmp