Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-07-2021 12:43
Static task
static1
Behavioral task
behavioral1
Sample
triage_dropped_file.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
triage_dropped_file.dll
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
triage_dropped_file.dll
-
Size
413KB
-
MD5
1a0a3f41570af7287e65642c607a3746
-
SHA1
30851f92c3e1cdd0a2bfb52a803e8eef93bdb669
-
SHA256
bb63cf1bbf457836cdaa43876fe78270a6fb2feca8f304715b7d2f5b7b69285b
-
SHA512
f23d1586dd6a9c33358ce184ae13b4d58a26443973068519abfd428aa03152e52f21b2a53bdbd3a4e965a3fe1f15c4680f7a81a6c260c603e96ed2dc1e924e28
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3980 created 2504 3980 regsvr32.exe Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3980 set thread context of 3212 3980 regsvr32.exe chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 3980 regsvr32.exe 3980 regsvr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe PID 3980 wrote to memory of 3212 3980 regsvr32.exe chrome.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.dll2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.dll"1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2192-118-0x0000000000FB0000-0x0000000000FEE000-memory.dmpFilesize
248KB
-
memory/3212-115-0x00007FF614E90000-0x00007FF6150D5000-memory.dmpFilesize
2.3MB
-
memory/3212-116-0x00007FF6150A77D8-mapping.dmp
-
memory/3212-117-0x00007FF614E90000-0x00007FF6150D5000-memory.dmpFilesize
2.3MB
-
memory/3980-114-0x0000000000E80000-0x0000000000EBE000-memory.dmpFilesize
248KB