Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 22:30

General

  • Target

    $R0.dll

  • Size

    48KB

  • MD5

    259b414cd4a28dade048139a3507cb88

  • SHA1

    2b7ac7f5356add8151c312dcec80148ba420cfa6

  • SHA256

    55633a3d6b77a7d2279f4fe9e02ae4cb5b5bf34a23bfae7a119518c0ecef09e9

  • SHA512

    377fa37e3ea0cfde65833a21693acfdddadbde04c180dc9209c7b6592ac402f273b7181295338ed9333a42140e54700dfbbc7a430979cb2e7692ee7c869b8c93

  • SSDEEP

    1536:+D+6RdfLMf6OOOOOOOOOOOOrrBjw8PZ7M:gHRdT46OOOOOOOOOOOOrrxw8PZM

Score
1/10

Malware Config

Signatures

  • Modifies registry class 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$R0.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$R0.dll
      2⤵
      • Modifies registry class
      PID:740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads