Analysis
-
max time kernel
154s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
27-05-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
05b9f2ea02a3a00860d856a13aecd6a900273e8ab0d8d128897ef37deab285d3.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
05b9f2ea02a3a00860d856a13aecd6a900273e8ab0d8d128897ef37deab285d3.dll
-
Size
21KB
-
MD5
0071fa9468e35dde86a7aab91750d1d0
-
SHA1
dfd41581fa282ec93cf6e3e66e8001bb8d9c8592
-
SHA256
05b9f2ea02a3a00860d856a13aecd6a900273e8ab0d8d128897ef37deab285d3
-
SHA512
6fd387ef39fe9b0a3ea376ec9c3df4f5f6f2a974b5e40f1a393adf03ecaa31fe9d27ef0d00182af1684aeda2ba1c566380963d0f7a443d8c39c28560fdfa3bf3
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Modifies registry class 60 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BD0022A3-A43F-4F44-B64F-53EA7575F097}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BD0022A3-A43F-4F44-B64F-53EA7575F097}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BD0022A3-A43F-4F44-B64F-53EA7575F097}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib\ = "{BD0022A3-A43F-4F44-B64F-53EA7575F097}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ = "IDocEventHandler" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ = "IDOMPeek" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BD0022A3-A43F-4F44-B64F-53EA7575F097}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IETLBAss.DOMP\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\ProgID\ = "IETLBAss.DOMP.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BD0022A3-A43F-4F44-B64F-53EA7575F097}\1.0\ = "AnalyzeIE 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BD0022A3-A43F-4F44-B64F-53EA7575F097}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\05b9f2ea02a3a00860d856a13aecd6a900273e8ab0d8d128897ef37deab285d3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib\ = "{BD0022A3-A43F-4F44-B64F-53EA7575F097}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib\ = "{BD0022A3-A43F-4F44-B64F-53EA7575F097}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IETLBAss.DOMP\CLSID\ = "{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IETLBAss.DOMP\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IETLBAss.DOMP\ = "DOMP Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ = "IDOMPeek" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BD0022A3-A43F-4F44-B64F-53EA7575F097} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BD0022A3-A43F-4F44-B64F-53EA7575F097}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IETLBAss.DOMP\CurVer\ = "IETLBAss.DOMP.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\VersionIndependentProgID\ = "IETLBAss.DOMP" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\05b9f2ea02a3a00860d856a13aecd6a900273e8ab0d8d128897ef37deab285d3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BD0022A3-A43F-4F44-B64F-53EA7575F097}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IETLBAss.DOMP.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IETLBAss.DOMP.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ = "IDocEventHandler" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\TypeLib\ = "{BD0022A3-A43F-4F44-B64F-53EA7575F097}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IETLBAss.DOMP.1\ = "DOMP Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IETLBAss.DOMP regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\ = "DOMP Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BD0022A3-A43F-4F44-B64F-53EA7575F097}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IETLBAss.DOMP.1\CLSID\ = "{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683}\TypeLib\ = "{BD0022A3-A43F-4F44-B64F-53EA7575F097}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0B6EF17E-18E5-4449-86EA-64C82D596EAE}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4C1B116F-2860-46db-8E6C-B4BFC4DFD683} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B1E68D42-02C4-465B-8368-5ED9B732E22D} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 2304 wrote to memory of 2432 2304 regsvr32.exe regsvr32.exe PID 2304 wrote to memory of 2432 2304 regsvr32.exe regsvr32.exe PID 2304 wrote to memory of 2432 2304 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\05b9f2ea02a3a00860d856a13aecd6a900273e8ab0d8d128897ef37deab285d3.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\05b9f2ea02a3a00860d856a13aecd6a900273e8ab0d8d128897ef37deab285d3.dll2⤵
- Modifies registry class
PID:2432
-