Analysis

  • max time kernel
    3s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 23:22

General

  • Target

    d056248103edae11a39bc6ebe67402dc06966085b9261a16339917ea04024594.dll

  • Size

    336KB

  • MD5

    630d2dc3da1437b5aae59e2ffdbfe99a

  • SHA1

    cb28b26ae943b4a9d085412a8ddb6b253b15c068

  • SHA256

    d056248103edae11a39bc6ebe67402dc06966085b9261a16339917ea04024594

  • SHA512

    b31394d7cc9ac20da3ad3c399c4cc87d32f923be5e2955e949eab0ec1a2e7f26b55115244e551c2bf09bfc777b613ab2327083b11ce1c62564633e6aa84d4690

  • SSDEEP

    3072:nrI1379njc4DTtVKBbzogLnj1qPlv14yWNSD/G:OTPKNzoyj1q34ywSD

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\d056248103edae11a39bc6ebe67402dc06966085b9261a16339917ea04024594.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\d056248103edae11a39bc6ebe67402dc06966085b9261a16339917ea04024594.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/952-56-0x0000000076171000-0x0000000076173000-memory.dmp

    Filesize

    8KB

  • memory/1736-54-0x000007FEFC281000-0x000007FEFC283000-memory.dmp

    Filesize

    8KB