Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 08:57

General

  • Target

    13e4138aeef587c039eb8afba2de4284.dll

  • Size

    449KB

  • MD5

    13e4138aeef587c039eb8afba2de4284

  • SHA1

    9746a5e2736b6962beccd95a5b1d8da910797943

  • SHA256

    b302347f2193396023ac40f4544997a3549163de8e2b4eb61496d6f92f52dab0

  • SHA512

    b546d7bb03281a7cdcf839d06338b2e79214a4d6c92b4ba18627ac4cc9b94f3be96637988753152b8e8d084d2d1ff2250a60549587adeb12a344c674bef78a5d

  • SSDEEP

    6144:yWIH1QSd9zIoBhWWUtjNcWqqqRywoei/ZNsuzZdQ0Sn6rU5nHrizG:f6/dFIkhy1HqqlwpWtzZdQz14S

Score
1/10

Malware Config

Signatures

  • Modifies registry class 38 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\SysWOW64\regsvr32.exe
    /s C:\Users\Admin\AppData\Local\Temp\13e4138aeef587c039eb8afba2de4284.dll
    1⤵
    • Modifies registry class
    PID:1868
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\13e4138aeef587c039eb8afba2de4284.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2892

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1868-0-0x0000000075000000-0x0000000075074000-memory.dmp

    Filesize

    464KB

  • memory/1868-2-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/1868-5-0x0000000000190000-0x00000000001B5000-memory.dmp

    Filesize

    148KB

  • memory/1868-6-0x0000000000190000-0x00000000001B5000-memory.dmp

    Filesize

    148KB

  • memory/1868-4-0x0000000075000000-0x0000000075074000-memory.dmp

    Filesize

    464KB

  • memory/1868-3-0x0000000000190000-0x00000000001B5000-memory.dmp

    Filesize

    148KB

  • memory/1868-1-0x0000000075000000-0x0000000075074000-memory.dmp

    Filesize

    464KB