Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 15:14
Behavioral task
behavioral1
Sample
034ae2fc5dc49b6b33a47d38719cc3b2.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
034ae2fc5dc49b6b33a47d38719cc3b2.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
034ae2fc5dc49b6b33a47d38719cc3b2.dll
-
Size
187KB
-
MD5
034ae2fc5dc49b6b33a47d38719cc3b2
-
SHA1
75d3f808508de98c626ec21103371e43e6470178
-
SHA256
dbb970153ca19a694bf23eb548e109254436d9b18512a8034c62b6bf3806e2f6
-
SHA512
289e805460026398c806ba0d6aaadb6c744387abe3f914d699a36aa7c7d12776f6f4fdb1a075dde62f56265c32a23767b081dc662cdaeeb135c79638c82c9e35
-
SSDEEP
3072:iztdAN/5+VeIJogpVISza/1ocBvabbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFB:0to/MgFg0Sza/dkwvP6bQ7yMP+DE827T
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 regsvr32.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1216 2364 regsvr32.exe 28 PID 2364 wrote to memory of 1216 2364 regsvr32.exe 28 PID 2364 wrote to memory of 1216 2364 regsvr32.exe 28 PID 2364 wrote to memory of 1216 2364 regsvr32.exe 28 PID 2364 wrote to memory of 1216 2364 regsvr32.exe 28 PID 2364 wrote to memory of 1216 2364 regsvr32.exe 28 PID 2364 wrote to memory of 1216 2364 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\034ae2fc5dc49b6b33a47d38719cc3b2.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\034ae2fc5dc49b6b33a47d38719cc3b2.dll2⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
PID:1216
-