Resubmissions
21-10-2021 10:35
211021-mmmglaback 1020-10-2021 19:12
211020-xwr4jshed7 1020-10-2021 17:12
211020-vqvldaacdj 10Analysis
-
max time kernel
4s -
max time network
18s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 17:12
Static task
static1
Behavioral task
behavioral1
Sample
Documents.tmp.dll
Resource
win7-en-20211014
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Documents.tmp.dll
Resource
win10-en-20210920
0 signatures
0 seconds
General
-
Target
Documents.tmp.dll
-
Size
1.7MB
-
MD5
133f935f9bc1c919af18db30f9db657d
-
SHA1
afb6253e491e109ebe2445ab4935f37120420b5c
-
SHA256
0648bdad8a597280f65f4db2448ba1524d6508841933156f4dfef9d1fe2e5075
-
SHA512
5d0c5f6ca0b28253a3537c11cfc7f5a72e417c4b4607a148dfa770c307466e81058f56b7ad67cb32761442cda0d720ea23281b41b4979f545ceff5041327cd04
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1680 wrote to memory of 2808 1680 regsvr32.exe regsvr32.exe PID 1680 wrote to memory of 2808 1680 regsvr32.exe regsvr32.exe PID 1680 wrote to memory of 2808 1680 regsvr32.exe regsvr32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2808-115-0x0000000000000000-mapping.dmp