Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 01:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e0786cfd02889f5cf8e98b648eb6863f.dll
Resource
win7-20240221-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
e0786cfd02889f5cf8e98b648eb6863f.dll
Resource
win10v2004-20240319-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
e0786cfd02889f5cf8e98b648eb6863f.dll
-
Size
891KB
-
MD5
e0786cfd02889f5cf8e98b648eb6863f
-
SHA1
22b9d971c7fdea19904c96ef4ffae5f6540cbd10
-
SHA256
83a4b08071ee6829a9c420e1c37ea767d986318a18fd937833fe43199d07c9a7
-
SHA512
0fc78c7d9482cb3e41866b768c9155a19fc184354470368db518c95c141ec220a042fc7eb93383dc1b341abb73fa9f8a7d45d8fffcdcd3018e4603dd873dea35
-
SSDEEP
24576:4ksNHkWxFfLAb87n+GyiTP/NwG7ZgqAc:zexFjAoHTiG7ZgTc
Score
6/10
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 regsvr32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\Count regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3588 wrote to memory of 4848 3588 regsvr32.exe 93 PID 3588 wrote to memory of 4848 3588 regsvr32.exe 93 PID 3588 wrote to memory of 4848 3588 regsvr32.exe 93
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e0786cfd02889f5cf8e98b648eb6863f.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e0786cfd02889f5cf8e98b648eb6863f.dll2⤵
- Maps connected drives based on registry
PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4052 --field-trial-handle=2252,i,3429015581403167983,2708022432612919502,262144 --variations-seed-version /prefetch:81⤵PID:1676