Analysis

  • max time kernel
    19s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-07-2021 17:02

General

  • Target

    compsBr.jpg.dll

  • Size

    401KB

  • MD5

    91a92949ee2fef988e550dad8d82a9fe

  • SHA1

    f96af4fec26ae74f0c87720511cd64a67537f5ea

  • SHA256

    8b53679870df2d7562d34d026ff5fe3596071f267e951470cfe2a53778a730c6

  • SHA512

    2641decbae7c73aa8f77c48a9e362f9862fdd0e9ae3799dc98f12a72d4e1cd0734e8ac0ebb3af08e90a7df5477b1b598752fc972c9b4344d878119a011e5a390

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\compsBr.jpg.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\compsBr.jpg.dll
      2⤵
        PID:1068
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 624
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1280

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1068-114-0x0000000000000000-mapping.dmp
    • memory/1068-115-0x00000000032F0000-0x000000000343A000-memory.dmp
      Filesize

      1.3MB