Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:53
Behavioral task
behavioral1
Sample
38c8e69f5f8d8301e4cfb923961c741b.dll
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
38c8e69f5f8d8301e4cfb923961c741b.dll
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
38c8e69f5f8d8301e4cfb923961c741b.dll
-
Size
43KB
-
MD5
38c8e69f5f8d8301e4cfb923961c741b
-
SHA1
18cc525cd8c31f3151bf6032b2b76b83c6ee7fd9
-
SHA256
2bbc0242a17ce344dea553cfb97f1d00e78c05d39ade45a7c7d4a9809ced5215
-
SHA512
3345b8a767b5ba4d2b4fccfc9932ac9ee549a11f63469cbe99be45d9ff9f392bd1a5295ce406687bf49ce788bca78aee1600940daaca5f6dcea544d67f708dfa
-
SSDEEP
768:M/mg9rllnbcxh/QFAWA4NP3TVGX26b+yef4SYfvsddTF3Exn38cwVvGwnZbP:M/T9P2S0iGX28+HhYfvG9FUxbwV/nZbP
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2224-0-0x0000000020000000-0x0000000020022000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2224 2036 regsvr32.exe 16 PID 2036 wrote to memory of 2224 2036 regsvr32.exe 16 PID 2036 wrote to memory of 2224 2036 regsvr32.exe 16