Analysis

  • max time kernel
    137s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    18-02-2024 21:55

General

  • Target

    ICQLiteShell.dll

  • Size

    56KB

  • MD5

    05e61539b8917fca37c03756bbdd043d

  • SHA1

    5a72e0e528260de0ea5b34badb9e5f9873cb4245

  • SHA256

    515c8e0b93f0fef15da3e2573ad92b7e7840374140e65e5d73df63d8e22cb3e8

  • SHA512

    565d57783e6044d6e7e2026c79dbd897e637c5e1d96e7930dc704ef2b6d801669b38f0c26382f00e67e26668439274941e937a0ade54666de50b5d84f6da7e97

  • SSDEEP

    768:YEGJ9blT7XZBSbHwJU+tGR0KZUyGKZ0ZgwmF1+3UVambg:YEGJ9bln5o0KZjGKZ0Z1mF1+3UVayg

Score
1/10

Malware Config

Signatures

  • Modifies registry class 54 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ICQLiteShell.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:412
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\ICQLiteShell.dll
      2⤵
      • Modifies registry class
      PID:3504

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads