Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 03:10
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
7eba1b2047afe9f903f32fb68c425bc7.dll
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
7eba1b2047afe9f903f32fb68c425bc7.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
7eba1b2047afe9f903f32fb68c425bc7.dll
-
Size
267KB
-
MD5
7eba1b2047afe9f903f32fb68c425bc7
-
SHA1
566e35824d0ce81d4340e41893a9211d7fc1e849
-
SHA256
7057eb3f8f0151d815a63c0fc46fbe6a997a0dbda29fd8e32fa99e6f9d8042bf
-
SHA512
d17b8178b6e2cc7a5918a7b6b715602b0fc1ba9390ee25f0b4cddcdf99f3c483ccfe3627004a23db26809fcda24e83fb0e27e27dacac3ad74843358f78db87a3
-
SSDEEP
6144:xP+xrTRoiKlHbjU0Yy9NrjKc2RFJTW6mSUQQ24tMS:xgq00YynrGRvTW6mHvld
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5096 regsvr32.exe Token: SeDebugPrivilege 5096 regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5096 regsvr32.exe 5096 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3760 wrote to memory of 5096 3760 regsvr32.exe 84 PID 3760 wrote to memory of 5096 3760 regsvr32.exe 84 PID 3760 wrote to memory of 5096 3760 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7eba1b2047afe9f903f32fb68c425bc7.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7eba1b2047afe9f903f32fb68c425bc7.dll2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5096
-