Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 12:48

General

  • Target

    PhotoMetadataHandler.dll

  • Size

    356KB

  • MD5

    95ab9b30166221ed22e43290d47198cd

  • SHA1

    b04497289e2a2d1e12efb8f5b618341d4fbd783d

  • SHA256

    ab2e7bc5a2e120148e14fbd1625c15655f9e2489c911537edc96bdcf560dfdf8

  • SHA512

    11c7045584981107e67926c1d519dbaf69bfa2c45c5a664407d7858c0a63d8fe2eb57417e3fb921fef382cdf945e5cce513c3974132789f95cb51f022cd30f87

  • SSDEEP

    6144:4rDxJipNwennlUgVINRyHj6xfm+vy4vWG1zYR8N:7VINRyD6o+dvRS8

Score
1/10

Malware Config

Signatures

  • Modifies registry class 18 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\PhotoMetadataHandler.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\PhotoMetadataHandler.dll
      2⤵
      • Modifies registry class
      PID:2192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RGI4AD4.tmp

    Filesize

    3KB

    MD5

    da0ce71a9eae9e48a77882da9c684044

    SHA1

    3447eb750064db1eb24732a7ae49afffa20fb29a

    SHA256

    afc63884a82111b35be225c339fa1ac58ab20600c642fccb053f7392d8a9f1ac

    SHA512

    7b765bd5f965cc4149191bd147667c6933fa919e272ea5c578f73c82707ea6d770ea680ce419707078d5e2d8eeb596373d47dee66980553b928cae67bf2dd723