Analysis
-
max time kernel
112s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 19:13
Behavioral task
behavioral1
Sample
ce83f0c41943025d993a2d9b7eaa15a0ac0c10f8cf910ddabceb9ca346b07a1a.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
ce83f0c41943025d993a2d9b7eaa15a0ac0c10f8cf910ddabceb9ca346b07a1a.dll
-
Size
543KB
-
MD5
840dae34c9e8be08b73ea452ba41ee77
-
SHA1
aaefa5511c2c7c0209e2f5d0a04231014333f0e7
-
SHA256
ce83f0c41943025d993a2d9b7eaa15a0ac0c10f8cf910ddabceb9ca346b07a1a
-
SHA512
390df0c53225ae4cdd2c9ed6270f226f4e9d9d056dbc79f417a38671beee76217092af0035075363dd6794b42131ac857e62476a29fd2795cdf1d175957ab368
-
SSDEEP
12288:Qf9he3lo91oIytluv3ovkkPpwRplVZBhCNl/qZ:/3C3y43ovkkPQZbCLS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4416-133-0x0000000010000000-0x0000000010089000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\ = "VirtualNetwork module" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6C517674-DE1C-4493-977C-34A1BFAB35BA} regsvr32.exe -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\Install = "OK" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualNetwork.VirtualNetwork.1\ = "VirtualNetwork Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{539CA3DC-95E8-402F-946D-C7D5584D321A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\VersionIndependentProgID\ = "VirtualNetwork.VirtualNetwork" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6A76A01-A0D3-4050-974F-0644EB82438B}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{539CA3DC-95E8-402F-946D-C7D5584D321A}\ = "VirtualNetworkPanel" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ce83f0c41943025d993a2d9b7eaa15a0ac0c10f8cf910ddabceb9ca346b07a1a.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualNetwork.VirtualNetwork\ = "VirtualNetwork Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{539CA3DC-95E8-402F-946D-C7D5584D321A}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualNetwork.VirtualNetwork.1\CLSID\ = "{6C517674-DE1C-4493-977C-34A1BFAB35BA}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{539CA3DC-95E8-402F-946D-C7D5584D321A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\ = "VirtualNetwork Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6A76A01-A0D3-4050-974F-0644EB82438B}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ce83f0c41943025d993a2d9b7eaa15a0ac0c10f8cf910ddabceb9ca346b07a1a.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6A76A01-A0D3-4050-974F-0644EB82438B}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualNetwork.VirtualNetwork\CLSID\ = "{6C517674-DE1C-4493-977C-34A1BFAB35BA}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6A76A01-A0D3-4050-974F-0644EB82438B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6A76A01-A0D3-4050-974F-0644EB82438B}\1.0\ = "VirtualNetwork Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{539CA3DC-95E8-402F-946D-C7D5584D321A}\Implemented Categories\{00021494-0000-0000-C000-000000000046} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\ProgID\ = "VirtualNetwork.VirtualNetwork.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualNetwork.VirtualNetwork\CurVer\ = "VirtualNetwork.VirtualNetwork.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualNetwork.VirtualNetwork.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{539CA3DC-95E8-402F-946D-C7D5584D321A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ce83f0c41943025d993a2d9b7eaa15a0ac0c10f8cf910ddabceb9ca346b07a1a.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\TypeLib\ = "{E6A76A01-A0D3-4050-974F-0644EB82438B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualNetwork.VirtualNetwork regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualNetwork.VirtualNetwork\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualNetwork.VirtualNetwork\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VirtualNetwork.VirtualNetwork.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E6A76A01-A0D3-4050-974F-0644EB82438B}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{539CA3DC-95E8-402F-946D-C7D5584D321A}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C517674-DE1C-4493-977C-34A1BFAB35BA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4744 wrote to memory of 4416 4744 regsvr32.exe 82 PID 4744 wrote to memory of 4416 4744 regsvr32.exe 82 PID 4744 wrote to memory of 4416 4744 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ce83f0c41943025d993a2d9b7eaa15a0ac0c10f8cf910ddabceb9ca346b07a1a.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ce83f0c41943025d993a2d9b7eaa15a0ac0c10f8cf910ddabceb9ca346b07a1a.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4416
-