Analysis
-
max time kernel
133s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 11:50
Behavioral task
behavioral1
Sample
7558d71491be53831fb03b669c939483ca0ca2f78fcbcd21b776a65fd52c1d6a.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
7558d71491be53831fb03b669c939483ca0ca2f78fcbcd21b776a65fd52c1d6a.dll
Resource
win10v2004-20240419-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
7558d71491be53831fb03b669c939483ca0ca2f78fcbcd21b776a65fd52c1d6a.dll
-
Size
24KB
-
MD5
2671d6be0ffbd9a25416ae575502a529
-
SHA1
f1afc35e9c22c348116037d24949099cc55397f9
-
SHA256
7558d71491be53831fb03b669c939483ca0ca2f78fcbcd21b776a65fd52c1d6a
-
SHA512
07e0a8f163874224d6981614e06970e8eb8b453952ae07ef118c222c1f96b844c934d51eef3058377a331b2f3a9658c11d28885b5c146c391c793b12638b1417
-
SSDEEP
192:Ho7irdwgJUdvrVmUh0KTb+NWkugbcl2YPg:HoA9sh0LNUf2YP
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1324 wrote to memory of 4460 1324 regsvr32.exe 83 PID 1324 wrote to memory of 4460 1324 regsvr32.exe 83 PID 1324 wrote to memory of 4460 1324 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7558d71491be53831fb03b669c939483ca0ca2f78fcbcd21b776a65fd52c1d6a.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7558d71491be53831fb03b669c939483ca0ca2f78fcbcd21b776a65fd52c1d6a.dll2⤵PID:4460
-