Analysis

  • max time kernel
    11s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-07-2021 15:41

General

  • Target

    compsBr.jpg.dll

  • Size

    490KB

  • MD5

    67d7982f23537172833949505e2fc091

  • SHA1

    0c1a40b42037d728c402eb4ea2c97a6837041dd3

  • SHA256

    49e76568aab61959380480cc594d346207c88911d340fd17cf20a0405a42aded

  • SHA512

    0990e6aa42f28f3b228a94d645ee5776d5126cb6d7bdd498e585e84c180567eac8c1817947caea3a5660464bd1d2efd7172cc0a72da72d00b148649ddde68d93

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\compsBr.jpg.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\compsBr.jpg.dll
      2⤵
        PID:188
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 188 -s 608
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2472

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/188-114-0x0000000000000000-mapping.dmp
    • memory/188-115-0x0000000004540000-0x000000000479D000-memory.dmp
      Filesize

      2.4MB

    • memory/188-116-0x0000000000930000-0x0000000000970000-memory.dmp
      Filesize

      256KB