Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 15:14
Behavioral task
behavioral1
Sample
034ae2fc5dc49b6b33a47d38719cc3b2.dll
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
034ae2fc5dc49b6b33a47d38719cc3b2.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
034ae2fc5dc49b6b33a47d38719cc3b2.dll
-
Size
187KB
-
MD5
034ae2fc5dc49b6b33a47d38719cc3b2
-
SHA1
75d3f808508de98c626ec21103371e43e6470178
-
SHA256
dbb970153ca19a694bf23eb548e109254436d9b18512a8034c62b6bf3806e2f6
-
SHA512
289e805460026398c806ba0d6aaadb6c744387abe3f914d699a36aa7c7d12776f6f4fdb1a075dde62f56265c32a23767b081dc662cdaeeb135c79638c82c9e35
-
SSDEEP
3072:iztdAN/5+VeIJogpVISza/1ocBvabbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFB:0to/MgFg0Sza/dkwvP6bQ7yMP+DE827T
Score
1/10
Malware Config
Signatures
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4472 wrote to memory of 4984 4472 regsvr32.exe 88 PID 4472 wrote to memory of 4984 4472 regsvr32.exe 88 PID 4472 wrote to memory of 4984 4472 regsvr32.exe 88
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\034ae2fc5dc49b6b33a47d38719cc3b2.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\034ae2fc5dc49b6b33a47d38719cc3b2.dll2⤵
- Modifies registry class
PID:4984
-