Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
07be0e6eac3a84a10945087dfc1b16d1cefd3c9a1d5c83c770e0e7191e56f7d7.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07be0e6eac3a84a10945087dfc1b16d1cefd3c9a1d5c83c770e0e7191e56f7d7.dll
Resource
win10v2004-20240704-en
General
-
Target
07be0e6eac3a84a10945087dfc1b16d1cefd3c9a1d5c83c770e0e7191e56f7d7.dll
-
Size
833KB
-
MD5
f72197f716ffea4d0a605b181d5543e0
-
SHA1
1251f31e5aa4c1e3fad6e46273d28fb428e1e822
-
SHA256
07be0e6eac3a84a10945087dfc1b16d1cefd3c9a1d5c83c770e0e7191e56f7d7
-
SHA512
5df1b58d9b7f0a9785e9249504fe9245c0cb7a09b9257147d5c96433cefa2e069fa500a4e0ba72ba85122352e9b2f449a4afd4ef70260332d61b3fa226ad93da
-
SSDEEP
12288:zKYnHshJQE0Wt7+GQrp3K2PIv/HWWTTWIPc45BjvrEH7O:eYHI0MRcIvfxTTWIPc4nrEH7O
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4904 wrote to memory of 892 4904 regsvr32.exe 81 PID 4904 wrote to memory of 892 4904 regsvr32.exe 81 PID 4904 wrote to memory of 892 4904 regsvr32.exe 81
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\07be0e6eac3a84a10945087dfc1b16d1cefd3c9a1d5c83c770e0e7191e56f7d7.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\07be0e6eac3a84a10945087dfc1b16d1cefd3c9a1d5c83c770e0e7191e56f7d7.dll2⤵PID:892
-