Analysis

  • max time kernel
    148s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 15:14

General

  • Target

    446ff612e1e3bf8eb4e95dfdc2640e05ec88da04b5396731f3dc3c64b8cde40b.dll

  • Size

    266KB

  • MD5

    08850950b18f51bef72d69d41907bd51

  • SHA1

    0f0d42b6b7a19ad391ce27f99c54e32c3ed579f2

  • SHA256

    446ff612e1e3bf8eb4e95dfdc2640e05ec88da04b5396731f3dc3c64b8cde40b

  • SHA512

    253f3c4e5f189c4c74870ec65593cf02ecd0e19106283c4c7e802267ec6f22e740a80a42d9ed36802c34eb7ae8a1ddeeb311151540151ab6be27817d2e37837b

  • SSDEEP

    3072:cRy6uX/SC+nUQ0S66vgvy+6/HFEB1RlBC:2yXvAQi+2C1U

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\446ff612e1e3bf8eb4e95dfdc2640e05ec88da04b5396731f3dc3c64b8cde40b.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\446ff612e1e3bf8eb4e95dfdc2640e05ec88da04b5396731f3dc3c64b8cde40b.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:4032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads