Analysis

  • max time kernel
    108s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 07:51

General

  • Target

    129e7d55de3f331f8f3b8ae17bb85a04.dll

  • Size

    588KB

  • MD5

    129e7d55de3f331f8f3b8ae17bb85a04

  • SHA1

    42aac8cb4612c7640e3f8e6bdf0c0637109bdfdf

  • SHA256

    26adb13ddf47987e3e84f554620ed113cc6b86755bd82b0c1c7d1eed6a2656f8

  • SHA512

    1a8d2f899b56288989f2d7d2c7b7dc2d816b1e3227f2948fa8b2101a43d14839a1c9ec87e7b715307aa129ef30bbe039dded032f5168a3d2db3c2418deaf2150

  • SSDEEP

    768:w58e3rjYY2uXZ9hAVaYUStKIZ+2fJcwqVETAz4HMBbsjjRGPZMo4/V:HbY2IGM7IZ+nVETAzFs1foo

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\129e7d55de3f331f8f3b8ae17bb85a04.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4320
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\129e7d55de3f331f8f3b8ae17bb85a04.dll
      2⤵
        PID:3144

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3144-0-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB