Analysis

  • max time kernel
    3s
  • max time network
    2s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2023, 21:09

General

  • Target

    49c8e03fa4b562b41907708811babaa86464d3ac717ef4d588890bd4bc1ac94d.dll

  • Size

    774KB

  • MD5

    c3f4ec92c1407a04dfe954a8e7ffae90

  • SHA1

    055710ad8e78f8a8965a4baf9ee78028f3372c9f

  • SHA256

    49c8e03fa4b562b41907708811babaa86464d3ac717ef4d588890bd4bc1ac94d

  • SHA512

    6756d0d6d26e6d8ad34603ad42ad0a47a0271dd2123cb1603795a44af39f7c35f6a81c73af0d2ae19070cd29de8460525afbbfcb3bc07d8212af1a5543bde409

  • SSDEEP

    24576:jMPmLmsLOesX5loATAQxmnVo3aoiCz0U:jcmLmEOesplh5xmnVoqoiC4

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\49c8e03fa4b562b41907708811babaa86464d3ac717ef4d588890bd4bc1ac94d.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\49c8e03fa4b562b41907708811babaa86464d3ac717ef4d588890bd4bc1ac94d.dll
      2⤵
      • Modifies registry class
      PID:1588

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1588-133-0x0000000011000000-0x00000000135D4000-memory.dmp

    Filesize

    37.8MB