Analysis

  • max time kernel
    36s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 14:11

General

  • Target

    cb5c000894068cf4b946ec2a559665480975b0bc078b244cefdd357391a60475.dll

  • Size

    164KB

  • MD5

    7f330d0bf00130ab6acc7e43722d309c

  • SHA1

    9b5f76c2aca0db42d5bc11f51895d16e6df92244

  • SHA256

    cb5c000894068cf4b946ec2a559665480975b0bc078b244cefdd357391a60475

  • SHA512

    670cde96db65cc61028c64e94b031cc55d73e191f4c258ac0102f72a7fc7753b3ccbd0ec9f18c1e7b233e73157e759fb01b8077901e2d70f732c8b8648243c18

  • SSDEEP

    3072:C6rX/TpZOzUimuWeBW8rFvl2mjEajZ1POMvv6p2CWc+E:1vTpZOVd08Z4H+vOMXe2CQ

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 29 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\cb5c000894068cf4b946ec2a559665480975b0bc078b244cefdd357391a60475.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\cb5c000894068cf4b946ec2a559665480975b0bc078b244cefdd357391a60475.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/784-54-0x000007FEFB871000-0x000007FEFB873000-memory.dmp

    Filesize

    8KB

  • memory/2028-56-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

    Filesize

    8KB