Analysis
-
max time kernel
125s -
max time network
162s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-07-2021 12:43
Static task
static1
Behavioral task
behavioral1
Sample
triage_dropped_file.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
triage_dropped_file.dll
Resource
win10v20210410
General
-
Target
triage_dropped_file.dll
-
Size
413KB
-
MD5
1a0a3f41570af7287e65642c607a3746
-
SHA1
30851f92c3e1cdd0a2bfb52a803e8eef93bdb669
-
SHA256
bb63cf1bbf457836cdaa43876fe78270a6fb2feca8f304715b7d2f5b7b69285b
-
SHA512
f23d1586dd6a9c33358ce184ae13b4d58a26443973068519abfd428aa03152e52f21b2a53bdbd3a4e965a3fe1f15c4680f7a81a6c260c603e96ed2dc1e924e28
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2044 created 1220 2044 regsvr32.exe Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2044 set thread context of 840 2044 regsvr32.exe chrome.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
regsvr32.exepid process 2044 regsvr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe PID 2044 wrote to memory of 840 2044 regsvr32.exe chrome.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.dll2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.dll"1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
2902de11e30dcc620b184e3bb0f0c1cb
SHA15d11d14a2558801a2688dc2d6dfad39ac294f222
SHA256e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544
SHA512efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
5c4ce21c7380024df8ccdd6e471f4639
SHA16b2b6e5b06ce9911085d90b9a66fc597e6fabc2f
SHA25656071b53ab06582bf987ece7faa82a515d1cb2c5a186499d3e87debb628c80fe
SHA512d40854e711f82d43c7bd4a021aacc2640830398faa2426470f4cc9fcc870e93ecf5c365515ec8f038f6a0acef2e24fb70ea8c104c49673426a72cc4bc023de34
-
memory/840-61-0x000000013F4C0000-0x000000013F705000-memory.dmpFilesize
2.3MB
-
memory/840-62-0x000000013F6D77D8-mapping.dmp
-
memory/840-63-0x000000013F4C0000-0x000000013F705000-memory.dmpFilesize
2.3MB
-
memory/1740-65-0x0000000000150000-0x000000000018E000-memory.dmpFilesize
248KB
-
memory/2044-59-0x000007FEFC251000-0x000007FEFC253000-memory.dmpFilesize
8KB
-
memory/2044-60-0x00000000001E0000-0x000000000021E000-memory.dmpFilesize
248KB