Analysis

  • max time kernel
    107s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    27-04-2022 16:09

General

  • Target

    2dae838574c19aa327c16cd508436cad1be76dab57057fe7eec46711a474cb7e.dll

  • Size

    484KB

  • MD5

    4d3902ac9c8a0a3b3756b9476873d395

  • SHA1

    eb0c66271ea08485ff7683bee33b9b897b12517a

  • SHA256

    2dae838574c19aa327c16cd508436cad1be76dab57057fe7eec46711a474cb7e

  • SHA512

    7d348509a07e3b1f73958e02ae109da3ed38431c13d5072e8231c68d54a75addbd3d4cecf8d13e027c7fcacfc60aab3235e375f84ef3971f0fcce7fd3f044148

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\2dae838574c19aa327c16cd508436cad1be76dab57057fe7eec46711a474cb7e.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\2dae838574c19aa327c16cd508436cad1be76dab57057fe7eec46711a474cb7e.dll
      2⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1616
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1500

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0HWJNGLE.txt
    Filesize

    605B

    MD5

    69491686ba37087eba00438e9d02dfc3

    SHA1

    f2caa1033b455af67d452658b7de32ea06486771

    SHA256

    6ff4476f5faa1501969468cf47e23d0ad48d3d7660121ee835ff1dcbea684981

    SHA512

    62ec11c889c6925f8ace4d64088818f594772af3ac4f83ee3f7dec708b47b601983ccc142c45593033f2d0c60df7808d9ee1958380a040aa61b7cf231ed4d6df

  • memory/1488-55-0x0000000000000000-mapping.dmp
  • memory/1488-56-0x00000000762C1000-0x00000000762C3000-memory.dmp
    Filesize

    8KB

  • memory/1640-54-0x000007FEFC111000-0x000007FEFC113000-memory.dmp
    Filesize

    8KB