Analysis
-
max time kernel
47s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 11:25
Behavioral task
behavioral1
Sample
9d8a23c1488f5bbe15a44547d86e75c25def6eefdbe4e1bf16ef2e177b066929.dll
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
9d8a23c1488f5bbe15a44547d86e75c25def6eefdbe4e1bf16ef2e177b066929.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
9d8a23c1488f5bbe15a44547d86e75c25def6eefdbe4e1bf16ef2e177b066929.dll
-
Size
40KB
-
MD5
5e637eb559b4d8984be545f63f708ad0
-
SHA1
c2fe62d115ee3950eac3c27af7f52b557564841a
-
SHA256
9d8a23c1488f5bbe15a44547d86e75c25def6eefdbe4e1bf16ef2e177b066929
-
SHA512
50ac87c948c71cdca75b24b7b38c20e06dd4adf3c13bebe8fc18c560a320cb2599300933fdb517d54525704c4a286c9db1e3dbbec4ba05052ec3ed3472779c51
-
SSDEEP
768:kK/Yb6iwhl8PXAHV3snbcuyD7UX4jJDLf:3nJHV3snouy8X4tDz
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/604-57-0x00000000701A0000-0x00000000701AB000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1056 wrote to memory of 604 1056 regsvr32.exe 28 PID 1056 wrote to memory of 604 1056 regsvr32.exe 28 PID 1056 wrote to memory of 604 1056 regsvr32.exe 28 PID 1056 wrote to memory of 604 1056 regsvr32.exe 28 PID 1056 wrote to memory of 604 1056 regsvr32.exe 28 PID 1056 wrote to memory of 604 1056 regsvr32.exe 28 PID 1056 wrote to memory of 604 1056 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\9d8a23c1488f5bbe15a44547d86e75c25def6eefdbe4e1bf16ef2e177b066929.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\9d8a23c1488f5bbe15a44547d86e75c25def6eefdbe4e1bf16ef2e177b066929.dll2⤵PID:604
-