Analysis
-
max time kernel
128s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
1ef1303163fec5d438734620fd4f31decea4274be3a056db6e01d78aea2b6ed1.dll
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
1ef1303163fec5d438734620fd4f31decea4274be3a056db6e01d78aea2b6ed1.dll
Resource
win10v2004-20230703-en
General
-
Target
1ef1303163fec5d438734620fd4f31decea4274be3a056db6e01d78aea2b6ed1.dll
-
Size
557KB
-
MD5
ad291e949f6dd01a4e6a401331205bf7
-
SHA1
95c41c7a596944f1753782915a7a06450e5ec728
-
SHA256
1ef1303163fec5d438734620fd4f31decea4274be3a056db6e01d78aea2b6ed1
-
SHA512
049de4f4f5da5e847be7781f5dfeab50e0ddbac97c745fd5afda8fa7bce2c3751d6fcb1fd92bf84f255c83ae740f4112bba809a20cf7a51a2ec9b164f2737c63
-
SSDEEP
6144:/tb7yOqt99IucNkuyCJ4nN5AmMsJc+KGNk0iJ1JpclXW9:tql334o54sq+Xk/vpUm9
Malware Config
Signatures
-
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00020021-0000-0000-C000-000000000046}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020001-0000-0000-C000-000000000046}\InprocServer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00020020-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0002000D-0000-0000-C000-000000000046}\InprocServer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0002000D-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0002000F-0000-0000-C000-000000000046}\InprocServer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00020021-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00020020-0000-0000-C000-000000000046}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020000-0000-0000-C000-000000000046}\InprocServer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020000-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020003-0000-0000-C000-000000000046}\InprocServer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020001-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020003-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0002000F-0000-0000-C000-000000000046} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4056 wrote to memory of 3296 4056 regsvr32.exe 83 PID 4056 wrote to memory of 3296 4056 regsvr32.exe 83 PID 4056 wrote to memory of 3296 4056 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1ef1303163fec5d438734620fd4f31decea4274be3a056db6e01d78aea2b6ed1.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1ef1303163fec5d438734620fd4f31decea4274be3a056db6e01d78aea2b6ed1.dll2⤵
- Modifies registry class
PID:3296
-