Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2023, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
f0c266113f9b13300794d051558778c0e61b375e4ded28dd377eb42b920353df.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f0c266113f9b13300794d051558778c0e61b375e4ded28dd377eb42b920353df.dll
Resource
win10v2004-20230221-en
General
-
Target
f0c266113f9b13300794d051558778c0e61b375e4ded28dd377eb42b920353df.dll
-
Size
232KB
-
MD5
9529a9b39f2e711165606da50b33e090
-
SHA1
0e9a46007e92b26bc8d9310cbe1ea4dcf8b4ddff
-
SHA256
f0c266113f9b13300794d051558778c0e61b375e4ded28dd377eb42b920353df
-
SHA512
537fb3026dc2de87f8b7c610abf4fcf48115b1c23642315fefa25970a53d4607daf319f7c27d6e9732f17ede3727684fb717051dc3e0ab7ec097088204f5f2ee
-
SSDEEP
1536:p4TNTPlz9BtJNpOvXfCDC0NyfNErV2/7/AMkkOqz2pVs78vHfZlXeJNkr2oSkCI5:wNDlpn9OPfCDBNyfAFuQ2oS65
Malware Config
Signatures
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A908DF43-151A-4751-A57B-F13A9EDB3303} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A908DF43-151A-4751-A57B-F13A9EDB3303}\1.0\ = "1 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A908DF43-151A-4751-A57B-F13A9EDB3303}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A908DF43-151A-4751-A57B-F13A9EDB3303}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f0c266113f9b13300794d051558778c0e61b375e4ded28dd377eb42b920353df.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A908DF43-151A-4751-A57B-F13A9EDB3303}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A908DF43-151A-4751-A57B-F13A9EDB3303}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A908DF43-151A-4751-A57B-F13A9EDB3303}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A908DF43-151A-4751-A57B-F13A9EDB3303}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A908DF43-151A-4751-A57B-F13A9EDB3303}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A908DF43-151A-4751-A57B-F13A9EDB3303}\1.0\0\win32 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4700 wrote to memory of 3400 4700 regsvr32.exe 86 PID 4700 wrote to memory of 3400 4700 regsvr32.exe 86 PID 4700 wrote to memory of 3400 4700 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f0c266113f9b13300794d051558778c0e61b375e4ded28dd377eb42b920353df.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\f0c266113f9b13300794d051558778c0e61b375e4ded28dd377eb42b920353df.dll2⤵
- Modifies registry class
PID:3400
-