Analysis

  • max time kernel
    129s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 06:46

General

  • Target

    $APPDATA/vehicletestdrive/_tmp/contextp.dll

  • Size

    11KB

  • MD5

    4ba4d296c73b2b4367b0029e1d7c1a6f

  • SHA1

    15aaf08c9aff48005a2a886c35a719bf286632ab

  • SHA256

    0da039d120c08e36e5bd6c9eafe84d45dff719473876f3902e7ca5c9aa00c24a

  • SHA512

    46a249c1110aec76179d44d4ae03c176dced623a3eb26003077034628eba7a09343da87afce41c02faf17e7e9cedaf69f354a576df92ba71fbb5ef5661bc1112

  • SSDEEP

    192:VjPYNu38npuW8IzMkA2Ny0W+uNgQWNjk8:5PDQ8Zi1W7gQWN

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$APPDATA\vehicletestdrive\_tmp\contextp.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$APPDATA\vehicletestdrive\_tmp\contextp.dll
      2⤵
      • Modifies registry class
      PID:5076

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads