Analysis

  • max time kernel
    157s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 16:53

General

  • Target

    b42a0a7f6bb1630af7a40846026a70532c052e250b50888fd889fa378921ce91.dll

  • Size

    371KB

  • MD5

    2077537b5967eda36f52151a818673ff

  • SHA1

    5b3d2b2a7e5b391ba4ad5f1d98aef9551e618daf

  • SHA256

    b42a0a7f6bb1630af7a40846026a70532c052e250b50888fd889fa378921ce91

  • SHA512

    056b3a68c7eadee90fcc10112793b8574b384322851a9d6c74d75312c37aa19701efa32703868653385fef79aea7c1c4783f75b94247720a6be7f80322792a44

  • SSDEEP

    6144:R+Ka7ZXdAcKlsdWxAL6n96vUsc2sXMb5TYLhB2dZ/Nd:Udd3Kls+9sUsZsyqLT2dZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\b42a0a7f6bb1630af7a40846026a70532c052e250b50888fd889fa378921ce91.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\b42a0a7f6bb1630af7a40846026a70532c052e250b50888fd889fa378921ce91.dll
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:2720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads