Analysis

  • max time kernel
    132s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 02:38

General

  • Target

    $R0.dll

  • Size

    1.1MB

  • MD5

    b8b4495dfb1ec27954358617afc1deca

  • SHA1

    5f208f81e29284e037fb2495c208d3d9fd0c1768

  • SHA256

    6318bcb4942df15ca631c612e5a4e94f0130b68c31bf141dedcd1a485842a0cf

  • SHA512

    3d95139d857a6f558aa296eb6334037892a5abd86614dc902d9af0d9a0b92a22d4e83a0dbd365f2749243a44a4a9b759bc796aefbbc758041e499d4699fb8e6d

  • SSDEEP

    12288:XvDDdvVRS3eCnipPaeQLaD7vEXtDQ6z6+YmzW8ViYE2S4niJDdn56Yd:vl6laDWy8q4npy

Score
1/10

Malware Config

Signatures

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$R0.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$R0.dll
      2⤵
      • Modifies registry class
      PID:4588

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads