Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 02:16
Behavioral task
behavioral1
Sample
梦幻精灵-2.4.0.0版/ocx/COMCAT.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
梦幻精灵-2.4.0.0版/ocx/COMCAT.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
梦幻精灵-2.4.0.0版/梦幻精灵.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
梦幻精灵-2.4.0.0版/梦幻精灵.exe
Resource
win10v2004-20231215-en
General
-
Target
梦幻精灵-2.4.0.0版/ocx/COMCAT.dll
-
Size
21KB
-
MD5
3b180da2b50b954a55fe37afba58d428
-
SHA1
c2a409311853ad4608418e790621f04155e55000
-
SHA256
96d04cdfaf4f4d7b8722b139a15074975d4c244302f78034b7be65df1a92fd03
-
SHA512
cf94ad749d91169078b8829288a2fc8de86ec2fe83d89dc27d54d03c73c0deca66b5d83abbeaa1ff09d0acac4c4352be6502945b5187ecde952cbb08037d07e8
-
SSDEEP
384:23Fob3slaN3oF1fHICOoMzMv/QTIBjDVquODJXsUW7ftWs6:Yo7s28JnOxzMv/QsBjRqugXspd
Malware Config
Signatures
-
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{40FC6ED3-2438-11CF-A3DB-080036F12502}\409 = "Embeddable Objects" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502}\409 = "Controls" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{40FC6ED9-2438-11CF-A3DB-080036F12502}\409 = "_Printable Objects" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{40FC6ED3-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002E005-0000-0000-C000-000000000046}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{40FC6ED8-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{40FC6ED9-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502}\409 = "Automation Objects" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{40FC6ED8-2438-11CF-A3DB-080036F12502}\409 = "Document Objects" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002E005-0000-0000-C000-000000000046} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2088 1728 regsvr32.exe 28 PID 1728 wrote to memory of 2088 1728 regsvr32.exe 28 PID 1728 wrote to memory of 2088 1728 regsvr32.exe 28 PID 1728 wrote to memory of 2088 1728 regsvr32.exe 28 PID 1728 wrote to memory of 2088 1728 regsvr32.exe 28 PID 1728 wrote to memory of 2088 1728 regsvr32.exe 28 PID 1728 wrote to memory of 2088 1728 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\梦幻精灵-2.4.0.0版\ocx\COMCAT.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\梦幻精灵-2.4.0.0版\ocx\COMCAT.dll2⤵
- Modifies registry class
PID:2088
-