Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2024, 23:45

General

  • Target

    51f30024b29577760446aeababb52b3b.dll

  • Size

    138KB

  • MD5

    51f30024b29577760446aeababb52b3b

  • SHA1

    518564ba6ce68cca43963f5ec56d0a6194ead1c6

  • SHA256

    e45055b07b7bd92626b2e420ab4633e096714dc3da455423f11bc31148fd016e

  • SHA512

    faa35003073d85a2b8d8e77ce75eafc49f23e80f017d72b9bb3f35ec6628fb429af4c2f344cd553a5d5cc649fa3facd2cf1a4841c8d8f5ff8f30823cc2154c0c

  • SSDEEP

    3072:nniCKttdWakp6GzofLHP8QyiKUv5EjT5TDu4UxfdwQxPIOw:iCKttdakGwxxKUB4MdB

Score
1/10

Malware Config

Signatures

  • Modifies registry class 25 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\SysWOW64\regsvr32.exe
    /s C:\Users\Admin\AppData\Local\Temp\51f30024b29577760446aeababb52b3b.dll
    1⤵
    • Modifies registry class
    PID:2292
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\51f30024b29577760446aeababb52b3b.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1416

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads