Analysis

  • max time kernel
    44s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2022 16:07

General

  • Target

    a6e117b1d30af60407a7b7506ef74dff11c4c01771a14c4b49226ac2fe4bd9a5.dll

  • Size

    332KB

  • MD5

    81b832a0d633492ec7d56c2e5309cc88

  • SHA1

    7a64947782012c8351c9a8350a35fed034ea429a

  • SHA256

    a6e117b1d30af60407a7b7506ef74dff11c4c01771a14c4b49226ac2fe4bd9a5

  • SHA512

    a69579612ab9f815c0295c9accb0ea5889b37462d3f77a91d8a35900f0dd0d6ee9dbbc2e9d26b269909dfdc9fd6d3cace9e11119f750ef684d2190791c609323

  • SSDEEP

    3072:lHAgi/l2oAL11LLyeXb+1BWPiSrjX61Wluy60L00Rasu:Lj11fXb+3WPiJ1NydL00Rat

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a6e117b1d30af60407a7b7506ef74dff11c4c01771a14c4b49226ac2fe4bd9a5.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\a6e117b1d30af60407a7b7506ef74dff11c4c01771a14c4b49226ac2fe4bd9a5.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:856

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/620-54-0x000007FEFC331000-0x000007FEFC333000-memory.dmp

    Filesize

    8KB

  • memory/856-55-0x0000000000000000-mapping.dmp

  • memory/856-56-0x0000000075711000-0x0000000075713000-memory.dmp

    Filesize

    8KB