Analysis

  • max time kernel
    43s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    27-04-2022 19:07

General

  • Target

    9ce47213d9bb40345ed3abea6d0b473f5ba34861436fc395bc133b44d15ac1c7.dll

  • Size

    248KB

  • MD5

    2385c4f996074d98c89def3b1b5d306f

  • SHA1

    e027697c44edce399f606ebc460cb22287bd76cd

  • SHA256

    9ce47213d9bb40345ed3abea6d0b473f5ba34861436fc395bc133b44d15ac1c7

  • SHA512

    b8058a60e47fa510e1f9f24c55fbf7ae2d027af3f15f4df5fec55562bff959668f13a8ad2f98b8d08ad87bd5118ea0a487274c255f7d4b5e03b367d766dea1d7

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 15 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\9ce47213d9bb40345ed3abea6d0b473f5ba34861436fc395bc133b44d15ac1c7.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\9ce47213d9bb40345ed3abea6d0b473f5ba34861436fc395bc133b44d15ac1c7.dll
      2⤵
      • Modifies registry class
      PID:1540

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1540-55-0x0000000000000000-mapping.dmp
  • memory/1540-56-0x00000000768D1000-0x00000000768D3000-memory.dmp
    Filesize

    8KB

  • memory/1824-54-0x000007FEFBFC1000-0x000007FEFBFC3000-memory.dmp
    Filesize

    8KB