Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 07:44

General

  • Target

    b0cf45ce38465dbca7e6a785bacf413f4b73b693f9dace64f2d262e0ee31ca52.dll

  • Size

    306KB

  • MD5

    1952b22f60f296cf26d0404c4e3c7982

  • SHA1

    97e63cb1ff5ca3e53173e0af925a4c32fe6994f6

  • SHA256

    b0cf45ce38465dbca7e6a785bacf413f4b73b693f9dace64f2d262e0ee31ca52

  • SHA512

    fb5443527b374e599336ef013273a1d087c58dc9a625d40b071e40776252aeca1dd27d4b7a2856cfc4dcbfa660604679f8e6c69e92ed1c4077f78620af5f6b83

  • SSDEEP

    6144:QQMiG5zBD+XFsLazcPFqR5CM7k4TB/jftzhda:QQMiG5B+1pzcP6n7k4T1jftzi

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\b0cf45ce38465dbca7e6a785bacf413f4b73b693f9dace64f2d262e0ee31ca52.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\b0cf45ce38465dbca7e6a785bacf413f4b73b693f9dace64f2d262e0ee31ca52.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2032

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1228-54-0x000007FEFB631000-0x000007FEFB633000-memory.dmp

          Filesize

          8KB

        • memory/2032-56-0x0000000075A11000-0x0000000075A13000-memory.dmp

          Filesize

          8KB