Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 12:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1cb1c6d20f71dedb7bc6feefdedd4a21.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1cb1c6d20f71dedb7bc6feefdedd4a21.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
1cb1c6d20f71dedb7bc6feefdedd4a21.dll
-
Size
14KB
-
MD5
1cb1c6d20f71dedb7bc6feefdedd4a21
-
SHA1
e6d1e5a2f0583e65aa9957b0a9d36a76efdd08e5
-
SHA256
f0119927b72c2262b52a62b758ce23abbec5241774b70ef1408f807f407b7d72
-
SHA512
0e14b59a73d8e2f4060f6a208db82a64ac8278c50393ff3757d36a6457a4f684d1a843a275b58faa3c24c12e00aeba7f4d2218dd8bdcccf50742de05dc700c48
-
SSDEEP
192:PtVvL5UQuRm9NJA7KnrnU/st5hDjbMtuJGP4O:PtVvL5UQuitnA/sjZMqxO
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2404 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2404 2420 regsvr32.exe 28 PID 2420 wrote to memory of 2404 2420 regsvr32.exe 28 PID 2420 wrote to memory of 2404 2420 regsvr32.exe 28 PID 2420 wrote to memory of 2404 2420 regsvr32.exe 28 PID 2420 wrote to memory of 2404 2420 regsvr32.exe 28 PID 2420 wrote to memory of 2404 2420 regsvr32.exe 28 PID 2420 wrote to memory of 2404 2420 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1cb1c6d20f71dedb7bc6feefdedd4a21.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1cb1c6d20f71dedb7bc6feefdedd4a21.dll2⤵
- Suspicious use of SetWindowsHookEx
PID:2404
-