Analysis

  • max time kernel
    40s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    27-05-2022 23:17

General

  • Target

    a4efe529bfed95acdba54c0af6a9fe330f2ca58e1c893980cb1e750e80e5e754.dll

  • Size

    296KB

  • MD5

    03cd6c7bd1a69cc1814f464bf6cb2b90

  • SHA1

    39d7e9fa83afa08067d8def0582adcf72e5c94a1

  • SHA256

    a4efe529bfed95acdba54c0af6a9fe330f2ca58e1c893980cb1e750e80e5e754

  • SHA512

    535305503db21964e5a7fc3e0a859cfb4a3463e5ee90b7f100bf29d0ccba5daca79a9c3515b7cfc163e26bfa889649cbc689cf092139d86387163c3229070c45

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a4efe529bfed95acdba54c0af6a9fe330f2ca58e1c893980cb1e750e80e5e754.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\a4efe529bfed95acdba54c0af6a9fe330f2ca58e1c893980cb1e750e80e5e754.dll
      2⤵
      • Modifies registry class
      PID:1120

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1120-55-0x0000000000000000-mapping.dmp
  • memory/1120-56-0x00000000753B1000-0x00000000753B3000-memory.dmp
    Filesize

    8KB

  • memory/1672-54-0x000007FEFBAA1000-0x000007FEFBAA3000-memory.dmp
    Filesize

    8KB