Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 08:43
Behavioral task
behavioral1
Sample
624c51cf3661ab3a589a5fcc1890d544d6b2da926eceba79e84f62a28b4f99ea.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
624c51cf3661ab3a589a5fcc1890d544d6b2da926eceba79e84f62a28b4f99ea.dll
Resource
win10v2004-20220812-en
General
-
Target
624c51cf3661ab3a589a5fcc1890d544d6b2da926eceba79e84f62a28b4f99ea.dll
-
Size
182KB
-
MD5
32c004ec44e45a3e713580de0f08b200
-
SHA1
e14459027e650ba6bbffd28d48f94aa1697825e3
-
SHA256
624c51cf3661ab3a589a5fcc1890d544d6b2da926eceba79e84f62a28b4f99ea
-
SHA512
e76479583434a7094179597689134dc141a3000b8d763f783e0f24cbaf4812cdbd5e6694126b6ed347eb23881f70ecd19ffae63286f3392df24d417ae8d85f48
-
SSDEEP
3072:sGE9+ZUsENVYbxeseM/ff1kWnBHbbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyD:K4ZIud7PdnB7wvP6bQ7yMP+DE827RCNJ
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 regsvr32.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\loader.DLL\AppID = "{D103EBF9-6DD5-4715-863A-00AA27C7935A}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\ = "loader 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{D103EBF9-6DD5-4715-863A-00AA27C7935A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\loader.DLL regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{D103EBF9-6DD5-4715-863A-00AA27C7935A}\ = "loader" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\624c51cf3661ab3a589a5fcc1890d544d6b2da926eceba79e84f62a28b4f99ea.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C85E2990-D4B6-44F5-A323-ED943493F8DF}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\624c51cf3661ab3a589a5fcc1890d544d6b2da926eceba79e84f62a28b4f99ea.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\624c51cf3661ab3a589a5fcc1890d544d6b2da926eceba79e84f62a28b4f99ea.dll2⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
PID:1204
-