Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 12:33

General

  • Target

    UIAutomationCore.dll

  • Size

    548KB

  • MD5

    fd049c25a168d3de310d9207b7b6367b

  • SHA1

    ec48264fc325579ea2d59f6f95957608a9a1d07f

  • SHA256

    48966605e7cf87996068ac1a2e563f90f6f152e710323792c633e10bcba480e4

  • SHA512

    d50c1b2db911cd303ac7b5eaef73badc9ef70ad7c2cf2a456b79ffde72f87fdaa25b06277fae6fa28c1a70a6f17d02db766f91df0ec4edb0ef05db0b7e988ca3

  • SSDEEP

    12288:4bOHQ+4oLOo7VkvT46yMCgfMJDsbt5uMA/UnJUra2oof:2OHh4oLHsCgfMJDsbt5nB2o

Score
1/10

Malware Config

Signatures

  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\UIAutomationCore.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\UIAutomationCore.dll
      2⤵
      • Modifies registry class
      PID:4860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads