Analysis

  • max time kernel
    137s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2023, 01:30

General

  • Target

    GS_LOADER/MP4SDEC.dll

  • Size

    8.7MB

  • MD5

    b8eb409a703938ec1a6ab332cc0dd1d5

  • SHA1

    83a35bec4a0515b7f7d450f76ed41267e4f968a5

  • SHA256

    73b49cc29c936c36f81f579a3230f428a87b7df821d5ffd549f01656b5db6ec3

  • SHA512

    ab55bbfd6dfc836f1c848fb8c962f38c5def19cc1df21ea6a609f2ef0acfdaa7c5329eb07d54c525b79531e6361c84ae890654ce81afe0a38ecacec2a8b01a68

  • SSDEEP

    196608:42uBSReuRV4gN/TD8bDjiiRRefPGI7wh9RY+WuNNoGXnHPitV:ZhReuD4e8bDjioIGOgngugGXwV

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies registry class 58 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\GS_LOADER\MP4SDEC.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\GS_LOADER\MP4SDEC.dll
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:4900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4900-133-0x0000000002DA0000-0x0000000002F66000-memory.dmp

    Filesize

    1.8MB

  • memory/4900-134-0x0000000010000000-0x0000000010F69000-memory.dmp

    Filesize

    15.4MB

  • memory/4900-139-0x0000000002DA0000-0x0000000002F66000-memory.dmp

    Filesize

    1.8MB

  • memory/4900-140-0x0000000002DA0000-0x0000000002F66000-memory.dmp

    Filesize

    1.8MB

  • memory/4900-141-0x0000000002F70000-0x000000000301F000-memory.dmp

    Filesize

    700KB

  • memory/4900-146-0x0000000002F70000-0x000000000301F000-memory.dmp

    Filesize

    700KB

  • memory/4900-147-0x0000000002F70000-0x000000000301F000-memory.dmp

    Filesize

    700KB