Analysis
-
max time kernel
38s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-04-2022 19:24
Static task
static1
Behavioral task
behavioral1
Sample
df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.dll
-
Size
555KB
-
MD5
9ebd333253645b60145fe62568a83e4d
-
SHA1
19e393300391bcfc2b8d7040498ae7210b131747
-
SHA256
df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3
-
SHA512
2676f55a7f47edec3e99dbd084ac57b893753b4f1d091dba25e752716d79b8a8fb7151209806c1b796ab426297b315a13b8f55e91762dc7be98c629633770c43
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Modifies registry class 11 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\ = "BatXunBae" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.RaevbXenBho\Clsid\ = "{D58BC268-9135-45EB-A810-C390F05DC5CD}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\ProgID\ = "df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.RaevbXenBho" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.RaevbXenBho regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.RaevbXenBho\ = "BatXunBae" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.RaevbXenBho\Clsid regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe PID 1304 wrote to memory of 1676 1304 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.dll2⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1304-54-0x000007FEFBDC1000-0x000007FEFBDC3000-memory.dmpFilesize
8KB
-
memory/1676-55-0x0000000000000000-mapping.dmp
-
memory/1676-56-0x0000000076451000-0x0000000076453000-memory.dmpFilesize
8KB
-
memory/1676-57-0x0000000001DB0000-0x0000000001E30000-memory.dmpFilesize
512KB