Analysis

  • max time kernel
    13s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 21:13

General

  • Target

    6b0d7ae73575b405ffef9d5bdefd93fb6c990553fc917bd2346fb52198f4e263.dll

  • Size

    220KB

  • MD5

    894763a19019efc4918bde8c07f3bb77

  • SHA1

    81d7d9a13567926aca7d8d985cb9764668d4b6e8

  • SHA256

    6b0d7ae73575b405ffef9d5bdefd93fb6c990553fc917bd2346fb52198f4e263

  • SHA512

    e85846bb98ec2e2bf03d79d87026d8b30c31c2f40e934d54321ad60966da12d352908d506b2ca9b62099d5419e7b747da2701c9a705f800f993bc5972124edad

  • SSDEEP

    3072:7yilvTOiSHUQ3eCxrlGODXvPq79X61BlZ8:7yiNTM5xrL7e961K

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\6b0d7ae73575b405ffef9d5bdefd93fb6c990553fc917bd2346fb52198f4e263.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\6b0d7ae73575b405ffef9d5bdefd93fb6c990553fc917bd2346fb52198f4e263.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:1416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1208-54-0x000007FEFB931000-0x000007FEFB933000-memory.dmp

    Filesize

    8KB

  • memory/1416-56-0x0000000075141000-0x0000000075143000-memory.dmp

    Filesize

    8KB