Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31/05/2023, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
7a06c9f8b61555494fb94da7ab9bcd611a5aeb08c690776bd00092de3067cbb9.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7a06c9f8b61555494fb94da7ab9bcd611a5aeb08c690776bd00092de3067cbb9.dll
Resource
win10v2004-20230220-en
General
-
Target
7a06c9f8b61555494fb94da7ab9bcd611a5aeb08c690776bd00092de3067cbb9.dll
-
Size
96KB
-
MD5
654972480b1495753eb41755cff10114
-
SHA1
a948cce2535889c48a4de173827f6316ab6ad6df
-
SHA256
7a06c9f8b61555494fb94da7ab9bcd611a5aeb08c690776bd00092de3067cbb9
-
SHA512
be0f676ab7c030c098737b3c56b4dd73bf3eabe58197b9ac6cc3fc6e1229964173846aaa38163df98bba7470f1a868e23b9dddeea4fbdc500dd4d6838d58278d
-
SSDEEP
1536:nlY693ve3B/EKOYjBFroZqwC+VoFCasGUOhUBfM:nS69Ct9+VoFCaMOhU
Malware Config
Signatures
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{25E609E4-B259-11CF-BFC7-444553540000} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1440 regsvr32.exe Token: SeDebugPrivilege 1440 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1440 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1440 1408 regsvr32.exe 28 PID 1408 wrote to memory of 1440 1408 regsvr32.exe 28 PID 1408 wrote to memory of 1440 1408 regsvr32.exe 28 PID 1408 wrote to memory of 1440 1408 regsvr32.exe 28 PID 1408 wrote to memory of 1440 1408 regsvr32.exe 28 PID 1408 wrote to memory of 1440 1408 regsvr32.exe 28 PID 1408 wrote to memory of 1440 1408 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7a06c9f8b61555494fb94da7ab9bcd611a5aeb08c690776bd00092de3067cbb9.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7a06c9f8b61555494fb94da7ab9bcd611a5aeb08c690776bd00092de3067cbb9.dll2⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1440
-