Analysis

  • max time kernel
    145s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 22:05

General

  • Target

    aae47463021454d2959e12aa89b949b4fbe77ef5c6bad92d8ff043f5a87d68bc.dll

  • Size

    156KB

  • MD5

    2a0d8c150f6f0e0f6258f110fd5db34d

  • SHA1

    dde041598d77392892626c9e79ea9191924c26a4

  • SHA256

    aae47463021454d2959e12aa89b949b4fbe77ef5c6bad92d8ff043f5a87d68bc

  • SHA512

    42d8ee0319e6a885787faac81f61acf4c07db0b174c42ac3a7b062000a2e86c5f790de01a77094438e4c8c9840d91ba830a7f91e6abd9d935c45e182cc45c407

  • SSDEEP

    3072:XIfi6M+yZ4KBQDw3QBpq3ynj6ARCPBr+MDRpu0gP+rpEhvOIRxAO6:XN6M+yHceQBpq86ARCPJnmr0Ic

Score
1/10

Malware Config

Signatures

  • Modifies registry class 23 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\aae47463021454d2959e12aa89b949b4fbe77ef5c6bad92d8ff043f5a87d68bc.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3400
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\aae47463021454d2959e12aa89b949b4fbe77ef5c6bad92d8ff043f5a87d68bc.dll
      2⤵
      • Modifies registry class
      PID:4076

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads