Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-04-2022 19:24
Static task
static1
Behavioral task
behavioral1
Sample
df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.dll
-
Size
555KB
-
MD5
9ebd333253645b60145fe62568a83e4d
-
SHA1
19e393300391bcfc2b8d7040498ae7210b131747
-
SHA256
df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3
-
SHA512
2676f55a7f47edec3e99dbd084ac57b893753b4f1d091dba25e752716d79b8a8fb7151209806c1b796ab426297b315a13b8f55e91762dc7be98c629633770c43
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Modifies registry class 11 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.RaevbXenBho\ = "BatXunBae" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.RaevbXenBho\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.RaevbXenBho\Clsid\ = "{D58BC268-9135-45EB-A810-C390F05DC5CD}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\ProgID\ = "df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.RaevbXenBho" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\ = "BatXunBae" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.RaevbXenBho regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D58BC268-9135-45EB-A810-C390F05DC5CD} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4608 wrote to memory of 4176 4608 regsvr32.exe regsvr32.exe PID 4608 wrote to memory of 4176 4608 regsvr32.exe regsvr32.exe PID 4608 wrote to memory of 4176 4608 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\df55bbc1dea83da1b6565a3160e1241e8a87efb94bc8b11c71684ce8b7653bf3.dll2⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4176-130-0x0000000000000000-mapping.dmp