Analysis

  • max time kernel
    134s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 11:44

General

  • Target

    AK/AKRunXDll.dll

  • Size

    35KB

  • MD5

    955616cb1bab109d860cddbc28e9d731

  • SHA1

    2add46878f5e672ce6b0ca017dc3e68b338c4777

  • SHA256

    26a824fbcba1116e55d2382c31e75a15851baecab34de49074587d74c4e841a7

  • SHA512

    58f078e86d38eb63e4ced892f1d79a0b74b84abbec18aae3feaf6238e0b20602ee1a2b1249e56a11f0a58fe255ff1182fadbe3ca1f4377620a130ff721617bca

  • SSDEEP

    384:BoKsQVqaDkVDZWNtpotaIs2gLLyUZBzNBTQFC7Bi1q6FbCTZ:qKsQYayZWNYsigLLjZ3CFCU7FbCF

Score
1/10

Malware Config

Signatures

  • Modifies registry class 46 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\SysWOW64\regsvr32.exe
    /s C:\Users\Admin\AppData\Local\Temp\AK\AKRunXDll.dll
    1⤵
    • Modifies registry class
    PID:5104
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\AK\AKRunXDll.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:432

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads