Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 03:44

General

  • Target

    4f9531c9baa8f148e2d40159920df7894d3a0c3f7cb305509faccb8e53fa4308.dll

  • Size

    74KB

  • MD5

    11444bb66cd772802449305b16bd9ed0

  • SHA1

    339d5288634063fb9a288676d5ece607fe2100b6

  • SHA256

    4f9531c9baa8f148e2d40159920df7894d3a0c3f7cb305509faccb8e53fa4308

  • SHA512

    64b6f46be310686f55e3b67c8ab2e2347190108231af604d481367a0399c3379a901f474174cfb8ff0b9ae486f728a66c9c07009f9fb8b7ab006aa135f14f47a

  • SSDEEP

    1536:6NI5I2S3fwExrH6IVruKx7NqF8YF8k+CzzNQkHJS4O0Zng2P+7G:qIS3oqH6Ip3g+YtTzzNQkpjOSg2Pt

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4f9531c9baa8f148e2d40159920df7894d3a0c3f7cb305509faccb8e53fa4308.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:992
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\4f9531c9baa8f148e2d40159920df7894d3a0c3f7cb305509faccb8e53fa4308.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:1888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/992-54-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmp

    Filesize

    8KB

  • memory/1888-56-0x0000000076561000-0x0000000076563000-memory.dmp

    Filesize

    8KB