Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 06:41

General

  • Target

    07fb560f1adb9b25519dc1dfb8c70738cc0e4c940062c21ead6fe80ce0288fbe.dll

  • Size

    78KB

  • MD5

    1a0c6fd33bb299d4868dad78cb325a9b

  • SHA1

    aeee1b747dd1d0892279286d89a5e1f4c2f3a589

  • SHA256

    07fb560f1adb9b25519dc1dfb8c70738cc0e4c940062c21ead6fe80ce0288fbe

  • SHA512

    6fef135adee3dccc081871efbb5ff78225bfce82c451c9347bada81a6c78afb575917fad40bc04db493f0ec8a4be2c6f80475496120945b8b16363199c68c460

  • SSDEEP

    1536:0Qmk+Px30oPvBjMOHkcItkQo2xNvA9cUiD6PJkCZuvuVw2cR1/H/:0Tx50qlu7ucUKSJkC5yrL/H

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\07fb560f1adb9b25519dc1dfb8c70738cc0e4c940062c21ead6fe80ce0288fbe.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\07fb560f1adb9b25519dc1dfb8c70738cc0e4c940062c21ead6fe80ce0288fbe.dll
      2⤵
      • Adds Run key to start application
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1400

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads