Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 14:25
Behavioral task
behavioral1
Sample
adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723.dll
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723.dll
-
Size
1.0MB
-
MD5
82526b36b1359d710553553789d5bed5
-
SHA1
3235a98f1f96b9d1f3dc9c41b7e054dfe8e58e43
-
SHA256
adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723
-
SHA512
31e642343c339b91fc5790a882d944dba22be5d9d5b0ebde39a3e579869feef3d5e6b67729399ee2d4ce09354514dd59ee1299f5983566b157aaf2cba69ae4b6
-
SSDEEP
24576:sLSwyb/tPUdQAYnDxf+z4W36Ofois2NUO59:sLBE/RDAYx+cSosN9
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\NoExplorer = "1" regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\ = "Recursos de Evento de Experiência com Aplicativo" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1BEE70CA-1030-46DA-BF12-9DAB80F0D63B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723.dll" regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3960 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 388 wrote to memory of 3960 388 regsvr32.exe 81 PID 388 wrote to memory of 3960 388 regsvr32.exe 81 PID 388 wrote to memory of 3960 388 regsvr32.exe 81
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723.dll1⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\adee7a8380137c99a60c5b2109962e9149a1d60a39d032e0ac4670c96c913723.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3960
-