Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 22:10

General

  • Target

    $PLUGINSDIR/admodule.dll

  • Size

    812KB

  • MD5

    a256337aedd10bfe85aa8d0cc759c4b1

  • SHA1

    292012487cd89842964712e1ad26e7dfb2c1fcb1

  • SHA256

    e2c24c63ac4da0e34a253c3cf8d6ec31da39740376fe2e87e52ba0f32c450640

  • SHA512

    250666689c156809dae72648e99d0a9abdb105375044c956d6c50e4107dce236d95a7925611566f8963b7bb0e956631aff9cce65695f1b7e493cfd4c849dab72

  • SSDEEP

    12288:01uRtBrct5O/dyANBseR1+bQE5NyH8/uUIid7vV+4KCaEovvV:3gturIGjUIid7rKvvXV

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\admodule.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\admodule.dll
      2⤵
      • Modifies registry class
      PID:1216

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads