Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
b0cf45ce38465dbca7e6a785bacf413f4b73b693f9dace64f2d262e0ee31ca52.dll
Resource
win7-20220901-en
3 signatures
150 seconds
General
-
Target
b0cf45ce38465dbca7e6a785bacf413f4b73b693f9dace64f2d262e0ee31ca52.dll
-
Size
306KB
-
MD5
1952b22f60f296cf26d0404c4e3c7982
-
SHA1
97e63cb1ff5ca3e53173e0af925a4c32fe6994f6
-
SHA256
b0cf45ce38465dbca7e6a785bacf413f4b73b693f9dace64f2d262e0ee31ca52
-
SHA512
fb5443527b374e599336ef013273a1d087c58dc9a625d40b071e40776252aeca1dd27d4b7a2856cfc4dcbfa660604679f8e6c69e92ed1c4077f78620af5f6b83
-
SSDEEP
6144:QQMiG5zBD+XFsLazcPFqR5CM7k4TB/jftzhda:QQMiG5B+1pzcP6n7k4T1jftzi
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{74d9563c-50f4-ef09-dd88-fa9b0037104c}\NoExplorer = "\"\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{74d9563c-50f4-ef09-dd88-fa9b0037104c} regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{74d9563c-50f4-ef09-dd88-fa9b0037104c} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{74d9563c-50f4-ef09-dd88-fa9b0037104c}\ = "adzgalore" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{74d9563c-50f4-ef09-dd88-fa9b0037104c}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{74d9563c-50f4-ef09-dd88-fa9b0037104c}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b0cf45ce38465dbca7e6a785bacf413f4b73b693f9dace64f2d262e0ee31ca52.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{74d9563c-50f4-ef09-dd88-fa9b0037104c}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2032 1228 regsvr32.exe 27 PID 1228 wrote to memory of 2032 1228 regsvr32.exe 27 PID 1228 wrote to memory of 2032 1228 regsvr32.exe 27 PID 1228 wrote to memory of 2032 1228 regsvr32.exe 27 PID 1228 wrote to memory of 2032 1228 regsvr32.exe 27 PID 1228 wrote to memory of 2032 1228 regsvr32.exe 27 PID 1228 wrote to memory of 2032 1228 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b0cf45ce38465dbca7e6a785bacf413f4b73b693f9dace64f2d262e0ee31ca52.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b0cf45ce38465dbca7e6a785bacf413f4b73b693f9dace64f2d262e0ee31ca52.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2032
-