Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 06:41
Behavioral task
behavioral1
Sample
07fb560f1adb9b25519dc1dfb8c70738cc0e4c940062c21ead6fe80ce0288fbe.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07fb560f1adb9b25519dc1dfb8c70738cc0e4c940062c21ead6fe80ce0288fbe.dll
Resource
win10v2004-20220901-en
General
-
Target
07fb560f1adb9b25519dc1dfb8c70738cc0e4c940062c21ead6fe80ce0288fbe.dll
-
Size
78KB
-
MD5
1a0c6fd33bb299d4868dad78cb325a9b
-
SHA1
aeee1b747dd1d0892279286d89a5e1f4c2f3a589
-
SHA256
07fb560f1adb9b25519dc1dfb8c70738cc0e4c940062c21ead6fe80ce0288fbe
-
SHA512
6fef135adee3dccc081871efbb5ff78225bfce82c451c9347bada81a6c78afb575917fad40bc04db493f0ec8a4be2c6f80475496120945b8b16363199c68c460
-
SSDEEP
1536:0Qmk+Px30oPvBjMOHkcItkQo2xNvA9cUiD6PJkCZuvuVw2cR1/H/:0Tx50qlu7ucUKSJkC5yrL/H
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\idypmhmv = "regsvr32 /u \"C:\\ProgramData\\idypmhmv.dll\"" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{38442f8c-1dd2-11b2-864d-a84a7ff6e44c} regsvr32.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38442f8c-1dd2-11b2-864d-a84a7ff6e44c} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38442f8c-1dd2-11b2-864d-a84a7ff6e44c}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\07fb560f1adb9b25519dc1dfb8c70738cc0e4c940062c21ead6fe80ce0288fbe.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38442f8c-1dd2-11b2-864d-a84a7ff6e44c}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38442f8c-1dd2-11b2-864d-a84a7ff6e44c}\InprocServer32\t = "1664914646" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38442f8c-1dd2-11b2-864d-a84a7ff6e44c}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1400 2288 regsvr32.exe 84 PID 2288 wrote to memory of 1400 2288 regsvr32.exe 84 PID 2288 wrote to memory of 1400 2288 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\07fb560f1adb9b25519dc1dfb8c70738cc0e4c940062c21ead6fe80ce0288fbe.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\07fb560f1adb9b25519dc1dfb8c70738cc0e4c940062c21ead6fe80ce0288fbe.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1400
-