Analysis

  • max time kernel
    90s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-02-2023 13:51

General

  • Target

    dxr.dll

  • Size

    247KB

  • MD5

    ee393ad971b476c86c696a30bbe0c31a

  • SHA1

    3c26ea4515ad6f30fcb0ea692bdbd950d0b0ae5f

  • SHA256

    1606d32aa812600a3a9837253b091a58b2d4939d6ad406cb0c45e4bee8230460

  • SHA512

    ab6537d12be09caf3365c943e22cbe7e3470a3b536a4b8333d52feb89d7503af804aeddecdaf0ceb2ee685c850241e671576a7c861125ec72e403ca8710da647

  • SSDEEP

    6144:KYCVTJWNPPC/OupE3tQto2YwU5qYyb4ji:KfcPPC2upE3two2Ywp

Score
1/10

Malware Config

Signatures

  • Modifies registry class 19 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\dxr.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3852
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\dxr.dll
      2⤵
      • Modifies registry class
      PID:4792

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads