Analysis

  • max time kernel
    92s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 18:29

General

  • Target

    dll/jmail.dll

  • Size

    311KB

  • MD5

    70afafa0dd89432651d7326c2f3edb4a

  • SHA1

    391f53f49109d2e911c33b3edbec6d49d718e398

  • SHA256

    18593e00993949e5cc3e04af9c810a8fbd4814ca4b84eff01060311d7ae0f8f7

  • SHA512

    58f236be7ea0378549a96bb3b171448628faf7cab9ba58cf066032125f0c159351bef28e25d9cad5540c6852ecfaebc4d8822d9dc10356b4318447cc26956002

  • SSDEEP

    3072:BHv2uGW3QZpmc93iRwVLM7RXnTqZP1JMTH/7pUaUMQJYkD7ke7ibQPhUWlzmYe6u:ep/+B+P1iHDWkohyQZdiIhVvU

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\dll\jmail.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\dll\jmail.dll
      2⤵
      • Modifies registry class
      PID:4708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads