Analysis
-
max time kernel
76s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 06:06
Behavioral task
behavioral1
Sample
90dd899c086be49d01a2c5d6893edd9e5e7155ec91dec3869f19f50301b66a32.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
90dd899c086be49d01a2c5d6893edd9e5e7155ec91dec3869f19f50301b66a32.dll
-
Size
209KB
-
MD5
66072a1bcd116ea0ae927a942c0e6c50
-
SHA1
ee866abe3e1440ffd1e956930f7c0631900db502
-
SHA256
90dd899c086be49d01a2c5d6893edd9e5e7155ec91dec3869f19f50301b66a32
-
SHA512
4e6acca3408f586b6cdf1bf1ffd1f6c6f10a43147e60188986daf72e00b2c6e828708c57984c807060f54757e33cf20a39be0dcde9d15003671ced8b98201e75
-
SSDEEP
6144:sxJbDzzwGOwpgzbthHWG82E55r+xShaMRfps5QC+9Tpv:srDvwDhHWG8RPBNSZEl
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{9C4218AC-B30F-4766-9638-DAA5CA570E9A} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9C4218AC-B30F-4766-9638-DAA5CA570E9A}\firststart = "0" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9C4218AC-B30F-4766-9638-DAA5CA570E9A}\NoExplorer = "1" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C4218AC-B30F-4766-9638-DAA5CA570E9A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C4218AC-B30F-4766-9638-DAA5CA570E9A}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C4218AC-B30F-4766-9638-DAA5CA570E9A}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C4218AC-B30F-4766-9638-DAA5CA570E9A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\90dd899c086be49d01a2c5d6893edd9e5e7155ec91dec3869f19f50301b66a32.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C4218AC-B30F-4766-9638-DAA5CA570E9A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3320 wrote to memory of 1708 3320 regsvr32.exe 83 PID 3320 wrote to memory of 1708 3320 regsvr32.exe 83 PID 3320 wrote to memory of 1708 3320 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\90dd899c086be49d01a2c5d6893edd9e5e7155ec91dec3869f19f50301b66a32.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\90dd899c086be49d01a2c5d6893edd9e5e7155ec91dec3869f19f50301b66a32.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1708
-