Resubmissions
06-07-2022 08:34
220706-kgpzescfa6 1010-02-2022 17:15
220210-vst3maaehl 1010-02-2022 17:13
220210-vrm8paaehk 1007-02-2022 17:48
220207-wdjh1sfbd2 430-01-2022 12:23
220130-pkf8xabfc3 3Analysis
-
max time kernel
201s -
max time network
278s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
07-02-2022 17:48
Static task
static1
Behavioral task
behavioral1
Sample
smphost.dll
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
smphost.dll
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
smphost.dll
-
Size
144KB
-
MD5
fc484855692f2a7d1eae090086a1eb72
-
SHA1
2e9103747750b40835f58d9e57c2ab75eeaf25f6
-
SHA256
e58b9bbb7bcdf3e901453b7b9c9e514fed1e53565e3280353dccc77cde26a98e
-
SHA512
2f6b6e8aa82dc4aa61a540bae1d98682ec79e73ccfeaf9c273b053c2162f35207842f7ab2f1bc06e927d706ec88ecf209d2c57e86323c38fb43e9d694e624311
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3780 1792 WerFault.exe regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
regsvr32.exeWerFault.exepid process 1792 regsvr32.exe 1792 regsvr32.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe 3780 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3780 WerFault.exe Token: SeBackupPrivilege 3780 WerFault.exe Token: SeDebugPrivilege 3780 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1696 wrote to memory of 1792 1696 regsvr32.exe regsvr32.exe PID 1696 wrote to memory of 1792 1696 regsvr32.exe regsvr32.exe PID 1696 wrote to memory of 1792 1696 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\smphost.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\smphost.dll2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 10283⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-