Analysis
-
max time kernel
92s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
cfb5bc4e441abbad1c76c61416134adb0774d52b38d0cd0c883fd44e354c487f.dll
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
cfb5bc4e441abbad1c76c61416134adb0774d52b38d0cd0c883fd44e354c487f.dll
-
Size
633KB
-
MD5
02f6a5d601a5d2f999e4b4914275fce1
-
SHA1
c3c538fbed3bbe0534a3cc0bd7232f311c7fc238
-
SHA256
cfb5bc4e441abbad1c76c61416134adb0774d52b38d0cd0c883fd44e354c487f
-
SHA512
8266906e6949e50562fd63901c943c5c47f6e1ed2181e1b14865e5096d2ebf98ed57343c312d681e3111f85a61418a567f6c6b9fe35362e60427d4a3ff517162
-
SSDEEP
12288:U3e7wpKIvsB/mnneeQCJ5cjjh7p90DpAZnccL:NS7sZEniCzUhV9jG
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{FCADDC14-BD46-408A-9842-CDBE1C6D37ED} regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37ED} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37ED}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37ED}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37ED}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cfb5bc4e441abbad1c76c61416134adb0774d52b38d0cd0c883fd44e354c487f.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FCADDC14-BD46-408A-9842-CDBE1C6D37ED}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 384 wrote to memory of 1032 384 regsvr32.exe 83 PID 384 wrote to memory of 1032 384 regsvr32.exe 83 PID 384 wrote to memory of 1032 384 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\cfb5bc4e441abbad1c76c61416134adb0774d52b38d0cd0c883fd44e354c487f.dll1⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\cfb5bc4e441abbad1c76c61416134adb0774d52b38d0cd0c883fd44e354c487f.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1032
-