Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-04-2022 16:08
Static task
static1
Behavioral task
behavioral1
Sample
062c7f979145590dd9ba1ae0d6fc8e18c4ff7af259975f6c4ac207fa99b5f32a.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
062c7f979145590dd9ba1ae0d6fc8e18c4ff7af259975f6c4ac207fa99b5f32a.dll
-
Size
8KB
-
MD5
8a2a1aafc86baa04e83d0d06d9e59372
-
SHA1
2da160334517eee1801b0709d4aba8e4612ef41e
-
SHA256
062c7f979145590dd9ba1ae0d6fc8e18c4ff7af259975f6c4ac207fa99b5f32a
-
SHA512
542693b959bd848640bf0b8f044983ddfe686218a179406fe17ed41d5e84b65e1c0fa9db3a54a08764c96524a1ceb79e7cbc77069a2ba59922bb2dd3c6c05c4f
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Modifies registry class 5 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{CFEE97A3-4911-444D-8BE8-E243A23D3DE2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CFEE97A3-4911-444D-8BE8-E243A23D3DE2}\www = "www" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{CFEE97A3-4911-444D-8BE8-E243A23D3DE2}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CFEE97A3-4911-444D-8BE8-E243A23D3DE2}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\062c7f979145590dd9ba1ae0d6fc8e18c4ff7af259975f6c4ac207fa99b5f32a.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CFEE97A3-4911-444D-8BE8-E243A23D3DE2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4752 wrote to memory of 3440 4752 regsvr32.exe regsvr32.exe PID 4752 wrote to memory of 3440 4752 regsvr32.exe regsvr32.exe PID 4752 wrote to memory of 3440 4752 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\062c7f979145590dd9ba1ae0d6fc8e18c4ff7af259975f6c4ac207fa99b5f32a.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\062c7f979145590dd9ba1ae0d6fc8e18c4ff7af259975f6c4ac207fa99b5f32a.dll2⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3440-130-0x0000000000000000-mapping.dmp