Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-01-2024 03:10
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
7eba1b2047afe9f903f32fb68c425bc7.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7eba1b2047afe9f903f32fb68c425bc7.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
7eba1b2047afe9f903f32fb68c425bc7.dll
-
Size
267KB
-
MD5
7eba1b2047afe9f903f32fb68c425bc7
-
SHA1
566e35824d0ce81d4340e41893a9211d7fc1e849
-
SHA256
7057eb3f8f0151d815a63c0fc46fbe6a997a0dbda29fd8e32fa99e6f9d8042bf
-
SHA512
d17b8178b6e2cc7a5918a7b6b715602b0fc1ba9390ee25f0b4cddcdf99f3c483ccfe3627004a23db26809fcda24e83fb0e27e27dacac3ad74843358f78db87a3
-
SSDEEP
6144:xP+xrTRoiKlHbjU0Yy9NrjKc2RFJTW6mSUQQ24tMS:xgq00YynrGRvTW6mHvld
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1720 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1720 2416 regsvr32.exe 28 PID 2416 wrote to memory of 1720 2416 regsvr32.exe 28 PID 2416 wrote to memory of 1720 2416 regsvr32.exe 28 PID 2416 wrote to memory of 1720 2416 regsvr32.exe 28 PID 2416 wrote to memory of 1720 2416 regsvr32.exe 28 PID 2416 wrote to memory of 1720 2416 regsvr32.exe 28 PID 2416 wrote to memory of 1720 2416 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7eba1b2047afe9f903f32fb68c425bc7.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7eba1b2047afe9f903f32fb68c425bc7.dll2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1720
-