Analysis
-
max time kernel
35s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
ecdfdd65480a4f1ad0e23754d956939d65a3a1c24724c3ed7281d1dd91c2554a.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ecdfdd65480a4f1ad0e23754d956939d65a3a1c24724c3ed7281d1dd91c2554a.dll
Resource
win10v2004-20220812-en
General
-
Target
ecdfdd65480a4f1ad0e23754d956939d65a3a1c24724c3ed7281d1dd91c2554a.dll
-
Size
48KB
-
MD5
32bd4b1eda736239c99b3acb45cf7b76
-
SHA1
8e6069e137b1574823522c2e2cf788fe2ab311c3
-
SHA256
ecdfdd65480a4f1ad0e23754d956939d65a3a1c24724c3ed7281d1dd91c2554a
-
SHA512
8bd58a06e9a1b3ad15cb7a844b4b52a55337208b8ad5433def33ebb977d7d3a7137dce2e8a6e7e4cff645424ea245c858dc92dc6dd949c2b2a5efc2ea0e58adf
-
SSDEEP
768:xg/f99xQkDccdzjqE/GDIyMAPZ2+mxGwkUxDVJ9yOoYfp+:m/1vQ0NdyEmIyMGTxw/tVCJYf
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 Rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2008 Rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 780 wrote to memory of 1920 780 regsvr32.exe 27 PID 780 wrote to memory of 1920 780 regsvr32.exe 27 PID 780 wrote to memory of 1920 780 regsvr32.exe 27 PID 780 wrote to memory of 1920 780 regsvr32.exe 27 PID 780 wrote to memory of 1920 780 regsvr32.exe 27 PID 780 wrote to memory of 1920 780 regsvr32.exe 27 PID 780 wrote to memory of 1920 780 regsvr32.exe 27 PID 1920 wrote to memory of 2008 1920 regsvr32.exe 28 PID 1920 wrote to memory of 2008 1920 regsvr32.exe 28 PID 1920 wrote to memory of 2008 1920 regsvr32.exe 28 PID 1920 wrote to memory of 2008 1920 regsvr32.exe 28 PID 1920 wrote to memory of 2008 1920 regsvr32.exe 28 PID 1920 wrote to memory of 2008 1920 regsvr32.exe 28 PID 1920 wrote to memory of 2008 1920 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ecdfdd65480a4f1ad0e23754d956939d65a3a1c24724c3ed7281d1dd91c2554a.dll1⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ecdfdd65480a4f1ad0e23754d956939d65a3a1c24724c3ed7281d1dd91c2554a.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\Rundll32.exeC:\Windows\system32\Rundll32.exe C:\Users\Admin\AppData\Local\Temp\ecdfdd65480a4f1ad0e23754d956939d65a3a1c24724c3ed7281d1dd91c2554a.dll,DllUnregisterServer3⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2008
-
-