Analysis
-
max time kernel
92s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
b3d936f3307d34d4c8457e2e1ef46f71ba818df56bca299dfb5a54d71912a3ae.dll
Resource
win7-20220901-en
3 signatures
150 seconds
General
-
Target
b3d936f3307d34d4c8457e2e1ef46f71ba818df56bca299dfb5a54d71912a3ae.dll
-
Size
144KB
-
MD5
74571e3e4f70dd389aae7acc9de4857f
-
SHA1
81a1f3dbd214f0b2ea23ddb0fd78b805ba5f2c1d
-
SHA256
b3d936f3307d34d4c8457e2e1ef46f71ba818df56bca299dfb5a54d71912a3ae
-
SHA512
541075639d0657e0f3cb820a4de2fcd67dae8ba0b948f5cf44d63de44d9a31ac353620e4a01a32e8f6957ed4c7701ac73c68f55fd0e7b3ba1978a49d3c94899a
-
SSDEEP
3072:bVQtcl8vPVsWceHDqGw3qiBefrC6R6/5U44J2:bVdGvPa4qGqqiB46yz
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9F531FB1-7C1F-4E1A-8C0C-E8D6177130E2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9F531FB1-7C1F-4E1A-8C0C-E8D6177130E2}\NoExplorer regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F531FB1-7C1F-4E1A-8C0C-E8D6177130E2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F531FB1-7C1F-4E1A-8C0C-E8D6177130E2}\ = "Gaming support for ArcadeWeb" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F531FB1-7C1F-4E1A-8C0C-E8D6177130E2}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F531FB1-7C1F-4E1A-8C0C-E8D6177130E2}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b3d936f3307d34d4c8457e2e1ef46f71ba818df56bca299dfb5a54d71912a3ae.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F531FB1-7C1F-4E1A-8C0C-E8D6177130E2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2204 1044 regsvr32.exe 83 PID 1044 wrote to memory of 2204 1044 regsvr32.exe 83 PID 1044 wrote to memory of 2204 1044 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b3d936f3307d34d4c8457e2e1ef46f71ba818df56bca299dfb5a54d71912a3ae.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b3d936f3307d34d4c8457e2e1ef46f71ba818df56bca299dfb5a54d71912a3ae.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2204
-