Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    15-02-2021 04:40

General

  • Target

    44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\system32\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 4
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\system32\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 3
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1408
        • C:\Windows\system32\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 2
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2208
          • C:\Windows\system32\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2512
            • C:\Windows\system32\regsvr32.exe
              C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
              6⤵
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2792
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3976
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1848
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:420
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4056
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4004
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3664
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:772
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3684
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3936
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4020
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3380
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1160
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3008
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1972
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:940
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2772
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3552
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1196
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3692
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1612
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:396
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3584
              • C:\Windows\system32\regsvr32.exe
                C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 1
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1772
                • C:\Windows\system32\regsvr32.exe
                  C:\Windows\system32\regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\\44ad0656ef0e7e356ad7a37992d81bb2832fd6f7d420a9502627a77c43f8f8d0.dll" 0
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1408

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\PREFHIST
    MD5

    e46c29f5fe8fd4df7ff69444ffd847c8

    SHA1

    3a5d2d44be97b4d5ef34ebf2ba4c58cf5865396c

    SHA256

    2c8e6c3ee5cbe499d1ea259fe987b073d312791270c08eba52cf4212d426263c

    SHA512

    c0a54ddc37a5fda5a250d449d7a9bd0626036aa780bbc739fc92701d8803f3914722aeef981160cdf1a08563ae72db30ae2771b7a00aed3eed56251434a5184e

  • memory/396-27-0x0000000000000000-mapping.dmp
  • memory/420-9-0x0000000000000000-mapping.dmp
  • memory/772-13-0x0000000000000000-mapping.dmp
  • memory/940-21-0x0000000000000000-mapping.dmp
  • memory/1160-18-0x0000000000000000-mapping.dmp
  • memory/1196-24-0x0000000000000000-mapping.dmp
  • memory/1408-3-0x0000000000000000-mapping.dmp
  • memory/1408-30-0x0000000000000000-mapping.dmp
  • memory/1612-26-0x0000000000000000-mapping.dmp
  • memory/1772-2-0x0000000000000000-mapping.dmp
  • memory/1772-29-0x0000000000000000-mapping.dmp
  • memory/1848-8-0x0000000000000000-mapping.dmp
  • memory/1972-20-0x0000000000000000-mapping.dmp
  • memory/2208-4-0x0000000000000000-mapping.dmp
  • memory/2512-5-0x0000000000000000-mapping.dmp
  • memory/2772-22-0x0000000000000000-mapping.dmp
  • memory/2792-6-0x0000000000000000-mapping.dmp
  • memory/3008-19-0x0000000000000000-mapping.dmp
  • memory/3380-17-0x0000000000000000-mapping.dmp
  • memory/3552-23-0x0000000000000000-mapping.dmp
  • memory/3584-28-0x0000000000000000-mapping.dmp
  • memory/3664-12-0x0000000000000000-mapping.dmp
  • memory/3684-14-0x0000000000000000-mapping.dmp
  • memory/3692-25-0x0000000000000000-mapping.dmp
  • memory/3936-15-0x0000000000000000-mapping.dmp
  • memory/3976-7-0x0000000000000000-mapping.dmp
  • memory/4004-11-0x0000000000000000-mapping.dmp
  • memory/4020-16-0x0000000000000000-mapping.dmp
  • memory/4056-10-0x0000000000000000-mapping.dmp