Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2023, 10:40

General

  • Target

    96d54290fa11849294cc2dd52f9f26540c535ef520b022118e6a768da5baacae.dll

  • Size

    268KB

  • MD5

    68fa9a9444d65b26dbefd07cd3e691f9

  • SHA1

    5a8db53939f32b94ab71bcc7421e80f89c365d6c

  • SHA256

    96d54290fa11849294cc2dd52f9f26540c535ef520b022118e6a768da5baacae

  • SHA512

    3604797d25d236ac7f7ee8d792e3ebcedad2b7082dabadda52083d576ce28a8e97cd87e5cad103776b5023c4e5a6ffb615365f57d1e6d3dc2f2b26da909ba340

  • SSDEEP

    6144:08+WQ5Tboq8TFcZV1ARZrRIoCfy3JLAvYSpVmkTz0Gent5:08+J5TboqMcZV1ARZrRI0avYWU35

Score
1/10

Malware Config

Signatures

  • Modifies registry class 52 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\96d54290fa11849294cc2dd52f9f26540c535ef520b022118e6a768da5baacae.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\96d54290fa11849294cc2dd52f9f26540c535ef520b022118e6a768da5baacae.dll
      2⤵
      • Modifies registry class
      PID:2168

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads