Analysis
-
max time kernel
4s -
max time network
50s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
18-05-2021 11:33
Static task
static1
Behavioral task
behavioral1
Sample
2b530fd990fae01d78fae8ca38b701cdb7abaffd350ec7ccdff662d13a337971.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
2b530fd990fae01d78fae8ca38b701cdb7abaffd350ec7ccdff662d13a337971.dll
-
Size
1.8MB
-
MD5
53d06f469b0236c5db723be8b68f2531
-
SHA1
1225150fdf8369cccfcd634fcc0c41ade90549a5
-
SHA256
2b530fd990fae01d78fae8ca38b701cdb7abaffd350ec7ccdff662d13a337971
-
SHA512
5da0347831be10ea1d08fc2c52a1eea0d6a84ac7460efda3c7e18c9d30ba38b166cf6841f7a7794de315b7d3ed0192a52d76c7031d976c27c975fd2e472594b4
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Modifies registry class 46 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D42047D9-38C2-4FD1-8337-F69C8F835A30}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D42047D9-38C2-4FD1-8337-F69C8F835A30}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2b530fd990fae01d78fae8ca38b701cdb7abaffd350ec7ccdff662d13a337971.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHelper.IEHlprObj\CurVer\ = "IEHelper.IEHlprObj.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D42047D9-38C2-4FD1-8337-F69C8F835A30}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D42047D9-38C2-4FD1-8337-F69C8F835A30} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D42047D9-38C2-4FD1-8337-F69C8F835A30}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D42047D9-38C2-4FD1-8337-F69C8F835A30}\1.0\ = "IEHelper 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\TypeLib\ = "{D42047D9-38C2-4FD1-8337-F69C8F835A30}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHelper.IEHlprObj.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHelper.IEHlprObj.1\ = "IEHlprObj Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHelper.IEHlprObj\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4}\TypeLib\ = "{D42047D9-38C2-4FD1-8337-F69C8F835A30}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHelper.IEHlprObj.1\CLSID\ = "{DAF9F01C-30F0-4A52-AF52-E236961977F4}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\TypeLib\ = "{D42047D9-38C2-4FD1-8337-F69C8F835A30}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\ = "IIEHlprObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHelper.IEHlprObj regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4}\VersionIndependentProgID\ = "IEHelper.IEHlprObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2b530fd990fae01d78fae8ca38b701cdb7abaffd350ec7ccdff662d13a337971.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D42047D9-38C2-4FD1-8337-F69C8F835A30}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D42047D9-38C2-4FD1-8337-F69C8F835A30}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D42047D9-38C2-4FD1-8337-F69C8F835A30}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHelper.IEHlprObj\ = "IEHlprObj Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D42047D9-38C2-4FD1-8337-F69C8F835A30}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHelper.IEHlprObj\CLSID\ = "{DAF9F01C-30F0-4A52-AF52-E236961977F4}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4}\ProgID\ = "IEHelper.IEHlprObj.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\ = "IIEHlprObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C0BEBABF-1785-4075-8C4D-8FEE7833D3CD}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHelper.IEHlprObj.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHelper.IEHlprObj\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4}\ = "IEHlprObj Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DAF9F01C-30F0-4A52-AF52-E236961977F4}\VersionIndependentProgID regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
regsvr32.exepid process 1980 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1828 wrote to memory of 1980 1828 regsvr32.exe regsvr32.exe PID 1828 wrote to memory of 1980 1828 regsvr32.exe regsvr32.exe PID 1828 wrote to memory of 1980 1828 regsvr32.exe regsvr32.exe PID 1828 wrote to memory of 1980 1828 regsvr32.exe regsvr32.exe PID 1828 wrote to memory of 1980 1828 regsvr32.exe regsvr32.exe PID 1828 wrote to memory of 1980 1828 regsvr32.exe regsvr32.exe PID 1828 wrote to memory of 1980 1828 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2b530fd990fae01d78fae8ca38b701cdb7abaffd350ec7ccdff662d13a337971.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2b530fd990fae01d78fae8ca38b701cdb7abaffd350ec7ccdff662d13a337971.dll2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1828-60-0x000007FEFBD61000-0x000007FEFBD63000-memory.dmpFilesize
8KB
-
memory/1980-61-0x0000000000000000-mapping.dmp
-
memory/1980-62-0x0000000075801000-0x0000000075803000-memory.dmpFilesize
8KB
-
memory/1980-63-0x0000000010000000-0x00000000104A3000-memory.dmpFilesize
4.6MB
-
memory/1980-64-0x0000000000180000-0x0000000000182000-memory.dmpFilesize
8KB