Analysis
-
max time kernel
164s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 05:49
Static task
static1
Behavioral task
behavioral1
Sample
f5e880f4413111d007e768215491f5c53c174252e6f39122afd9178367e3e182.dll
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
f5e880f4413111d007e768215491f5c53c174252e6f39122afd9178367e3e182.dll
Resource
win10v2004-20221111-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
f5e880f4413111d007e768215491f5c53c174252e6f39122afd9178367e3e182.dll
-
Size
22KB
-
MD5
3b08b1accc57c30ad2e8ab16da0a31ac
-
SHA1
45c7b08b91209d5ca4515a830fc37ccf62882ec8
-
SHA256
f5e880f4413111d007e768215491f5c53c174252e6f39122afd9178367e3e182
-
SHA512
926c5feab733748444111d9fb8718d3ef14603954ca1db0cbb5ffcf73ae619249b07d9f618221cac3bf44e8e9da7931724f7c4f7b1246ff0fbec9935d0113290
-
SSDEEP
384:salgSAJ5UL8pjAO51dWFjxbEdzEl0j4kl0j4:dihjAU1FEWjxWj
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3932 regsvr32.exe 3932 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 624 wrote to memory of 3932 624 regsvr32.exe 82 PID 624 wrote to memory of 3932 624 regsvr32.exe 82 PID 624 wrote to memory of 3932 624 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f5e880f4413111d007e768215491f5c53c174252e6f39122afd9178367e3e182.dll1⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\f5e880f4413111d007e768215491f5c53c174252e6f39122afd9178367e3e182.dll2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-