Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
29-05-2022 21:51
Static task
static1
Behavioral task
behavioral1
Sample
0d1455007d1198dcfbb2f545136646371a1384ad1f847cb33cad826e74f42700.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
0d1455007d1198dcfbb2f545136646371a1384ad1f847cb33cad826e74f42700.dll
-
Size
565KB
-
MD5
d254b3e87441b1dbec8f1381acb919ed
-
SHA1
936df8435429d2b22760c4d235b99c5dbb04f815
-
SHA256
0d1455007d1198dcfbb2f545136646371a1384ad1f847cb33cad826e74f42700
-
SHA512
c8dfe080d2d1ee02be16bbc869e1cd03c463321e3fa5d8a4f35f2e352df88579cc7b0a0099ac6877b307bb7e70d7f4109b84bb0d27fca7e99d745bd6d15f3fd7
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Modifies registry class 11 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\0d1455007d1198dcfbb2f545136646371a1384ad1f847cb33cad826e74f42700.xx\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DCF3-47AA-1B1F-A78C9DB1C352}\ProgID\ = "0d1455007d1198dcfbb2f545136646371a1384ad1f847cb33cad826e74f42700.xx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\0d1455007d1198dcfbb2f545136646371a1384ad1f847cb33cad826e74f42700.xx\ = "xx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\0d1455007d1198dcfbb2f545136646371a1384ad1f847cb33cad826e74f42700.xx\Clsid\ = "{CC01FC6C-DCF3-47AA-1B1F-A78C9DB1C352}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DCF3-47AA-1B1F-A78C9DB1C352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DCF3-47AA-1B1F-A78C9DB1C352}\ = "xx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DCF3-47AA-1B1F-A78C9DB1C352}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DCF3-47AA-1B1F-A78C9DB1C352}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0d1455007d1198dcfbb2f545136646371a1384ad1f847cb33cad826e74f42700.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DCF3-47AA-1B1F-A78C9DB1C352}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\0d1455007d1198dcfbb2f545136646371a1384ad1f847cb33cad826e74f42700.xx regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DCF3-47AA-1B1F-A78C9DB1C352}\ProgID regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1784 wrote to memory of 1896 1784 regsvr32.exe regsvr32.exe PID 1784 wrote to memory of 1896 1784 regsvr32.exe regsvr32.exe PID 1784 wrote to memory of 1896 1784 regsvr32.exe regsvr32.exe PID 1784 wrote to memory of 1896 1784 regsvr32.exe regsvr32.exe PID 1784 wrote to memory of 1896 1784 regsvr32.exe regsvr32.exe PID 1784 wrote to memory of 1896 1784 regsvr32.exe regsvr32.exe PID 1784 wrote to memory of 1896 1784 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0d1455007d1198dcfbb2f545136646371a1384ad1f847cb33cad826e74f42700.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0d1455007d1198dcfbb2f545136646371a1384ad1f847cb33cad826e74f42700.dll2⤵
- Modifies registry class
PID:1896
-