Analysis

  • max time kernel
    36s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    27-05-2022 22:56

General

  • Target

    2da9dc8e184390955c462e71115693776e3c5b44cb741e3ce3d18f4183bc761a.dll

  • Size

    556KB

  • MD5

    03e9899abd7de4b3b87d7dd3692eef9d

  • SHA1

    5119dad734b03df432029ad030fcab7f052006b6

  • SHA256

    2da9dc8e184390955c462e71115693776e3c5b44cb741e3ce3d18f4183bc761a

  • SHA512

    e7e072568bad18b1e28413b66879920663ccb064a181f17cb8aba91579e9af96adf63875ffa7ef9885de6b04d007a20e540d4984855bceb3e77c6ea03e33f281

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\2da9dc8e184390955c462e71115693776e3c5b44cb741e3ce3d18f4183bc761a.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\2da9dc8e184390955c462e71115693776e3c5b44cb741e3ce3d18f4183bc761a.dll
      2⤵
      • Modifies registry class
      PID:1108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/872-54-0x000007FEFBF21000-0x000007FEFBF23000-memory.dmp
    Filesize

    8KB

  • memory/1108-55-0x0000000000000000-mapping.dmp
  • memory/1108-56-0x0000000076721000-0x0000000076723000-memory.dmp
    Filesize

    8KB

  • memory/1108-57-0x0000000000250000-0x00000000002D0000-memory.dmp
    Filesize

    512KB