Analysis

  • max time kernel
    92s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2024 03:10

General

  • Target

    7eba1b2047afe9f903f32fb68c425bc7.dll

  • Size

    267KB

  • MD5

    7eba1b2047afe9f903f32fb68c425bc7

  • SHA1

    566e35824d0ce81d4340e41893a9211d7fc1e849

  • SHA256

    7057eb3f8f0151d815a63c0fc46fbe6a997a0dbda29fd8e32fa99e6f9d8042bf

  • SHA512

    d17b8178b6e2cc7a5918a7b6b715602b0fc1ba9390ee25f0b4cddcdf99f3c483ccfe3627004a23db26809fcda24e83fb0e27e27dacac3ad74843358f78db87a3

  • SSDEEP

    6144:xP+xrTRoiKlHbjU0Yy9NrjKc2RFJTW6mSUQQ24tMS:xgq00YynrGRvTW6mHvld

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7eba1b2047afe9f903f32fb68c425bc7.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\7eba1b2047afe9f903f32fb68c425bc7.dll
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5096

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5096-0-0x00000000022C0000-0x00000000023A1000-memory.dmp

    Filesize

    900KB

  • memory/5096-2-0x00000000022C0000-0x00000000023A1000-memory.dmp

    Filesize

    900KB

  • memory/5096-1-0x00000000022C0000-0x00000000023A1000-memory.dmp

    Filesize

    900KB