Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2024 09:51
Behavioral task
behavioral1
Sample
44e12bae1e5d309752e35b420897ebaf229a041ce9ad35c5b47dd224a2499071.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
44e12bae1e5d309752e35b420897ebaf229a041ce9ad35c5b47dd224a2499071.dll
Resource
win10v2004-20240226-en
General
-
Target
44e12bae1e5d309752e35b420897ebaf229a041ce9ad35c5b47dd224a2499071.dll
-
Size
347KB
-
MD5
c5f25f45c07cb4e0291eea6e8a8779fb
-
SHA1
2e17aaee110bf573587193f0e374eecd8b75c228
-
SHA256
44e12bae1e5d309752e35b420897ebaf229a041ce9ad35c5b47dd224a2499071
-
SHA512
3b5a101ad0c7853e04918e3831aac9ddaadcb539ad9e2aaeca87a80e011e2d57443cc3158117f9cf6179960cf54a5475174e7c2a29fa8925c22b3a0ab24011cd
-
SSDEEP
6144:BX1K0hROWQHfYtH4ve6REwSBPuuOVN7Oc5jthTq5wzDigK:F1KMEWQHfaYveI6OT7x/1Dig
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 3536 regsvr32.exe 3536 regsvr32.exe 5104 regsvr32.exe 5104 regsvr32.exe 5104 regsvr32.exe 5104 regsvr32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
regsvr32.exepid process 3536 regsvr32.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3536 wrote to memory of 5104 3536 regsvr32.exe regsvr32.exe PID 3536 wrote to memory of 5104 3536 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\44e12bae1e5d309752e35b420897ebaf229a041ce9ad35c5b47dd224a2499071.dll1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\Qxprlfmud\ZABPtYXjG.dll"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104