Analysis

  • max time kernel
    37s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    09-02-2023 10:25

General

  • Target

    a21debfd89456d0011328861d6d23c7569c3e56d9f815505410368bdccd4a0d2.dll

  • Size

    307KB

  • MD5

    e683b599741eb36d5a81eab63d058395

  • SHA1

    684ee3e3a21eeb7c90c02c5b0827bfa8bb494921

  • SHA256

    a21debfd89456d0011328861d6d23c7569c3e56d9f815505410368bdccd4a0d2

  • SHA512

    82435149fe7e1985f15aa29dbe2b0538310412b7a1942afc94f21503f9a3474bd67ade02785da417caa02b1739741692332c7913342f1ec6593a1867b5b4675c

  • SSDEEP

    6144:UZzN66bEzuPrOx2jK9M1cMl43wH41vWq5Fu0qbsueAAy+VwyBx6:UZzw6AuPrBu9M3q2m+q5NuJ+I

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a21debfd89456d0011328861d6d23c7569c3e56d9f815505410368bdccd4a0d2.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\a21debfd89456d0011328861d6d23c7569c3e56d9f815505410368bdccd4a0d2.dll
      2⤵
      • Modifies registry class
      PID:1504

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1504-55-0x0000000000000000-mapping.dmp
  • memory/1504-56-0x00000000760C1000-0x00000000760C3000-memory.dmp
    Filesize

    8KB

  • memory/1980-54-0x000007FEFB7B1000-0x000007FEFB7B3000-memory.dmp
    Filesize

    8KB