Analysis
-
max time kernel
115s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:44
Behavioral task
behavioral1
Sample
8a469d5bf8759cc7796804f9aa963daddfb6a65635328e2965e34525af1354b1.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8a469d5bf8759cc7796804f9aa963daddfb6a65635328e2965e34525af1354b1.dll
Resource
win10v2004-20220812-en
General
-
Target
8a469d5bf8759cc7796804f9aa963daddfb6a65635328e2965e34525af1354b1.dll
-
Size
13KB
-
MD5
cba8336b2f63e16df4e988f8b6282d2d
-
SHA1
dc0068f8181f84ec329e77ee0f2150cca4833eee
-
SHA256
8a469d5bf8759cc7796804f9aa963daddfb6a65635328e2965e34525af1354b1
-
SHA512
abeb610ff1b3d52b80a86086f0dc6d40380c2b025fb7877b6f5007d8ccc913d4e89334a58cdb5d0869331b2e40d06b358de0dc29551d614aeef0a959fd86ee14
-
SSDEEP
192:rgL9CsONvBZoJ+SqGhuoEcypNxmWN0oET/iDjhgzXf1HBDxAA:iONvBZoJ+HFfp3mWuyDjOZHBd
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4912-133-0x0000000011000000-0x000000001100C000-memory.dmp upx -
Modifies registry class 45 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\TypeLib\ = "{376AB2C7-5423-45B6-82A9-3DD696F21D99}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{376AB2C7-5423-45B6-82A9-3DD696F21D99}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\TypeLib\ = "{376AB2C7-5423-45B6-82A9-3DD696F21D99}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\TypeLib\ = "{376AB2C7-5423-45B6-82A9-3DD696F21D99}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\ = "Obj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{376AB2C7-5423-45B6-82A9-3DD696F21D99}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{376AB2C7-5423-45B6-82A9-3DD696F21D99}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\ = "_Obj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Anonymizer.Obj\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\ProxyStubClsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\ = "_Obj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{376AB2C7-5423-45B6-82A9-3DD696F21D99}\1.0\ = "Anonymizer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{376AB2C7-5423-45B6-82A9-3DD696F21D99}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{376AB2C7-5423-45B6-82A9-3DD696F21D99}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8a469d5bf8759cc7796804f9aa963daddfb6a65635328e2965e34525af1354b1.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{376AB2C7-5423-45B6-82A9-3DD696F21D99}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\VERSION\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\ = "Anonymizer.Obj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\VERSION regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Anonymizer.Obj regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Anonymizer.Obj\ = "Anonymizer.Obj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{376AB2C7-5423-45B6-82A9-3DD696F21D99} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{376AB2C7-5423-45B6-82A9-3DD696F21D99}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8a469d5bf8759cc7796804f9aa963daddfb6a65635328e2965e34525af1354b1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Anonymizer.Obj\Clsid\ = "{6C3D1CBD-3241-4646-8647-35319719D8DB}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DADC1E05-AA6B-426C-9620-95DA5CB660E2}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{376AB2C7-5423-45B6-82A9-3DD696F21D99}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\ProgID\ = "Anonymizer.Obj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6C3D1CBD-3241-4646-8647-35319719D8DB}\TypeLib regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 4304 wrote to memory of 4912 4304 regsvr32.exe regsvr32.exe PID 4304 wrote to memory of 4912 4304 regsvr32.exe regsvr32.exe PID 4304 wrote to memory of 4912 4304 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8a469d5bf8759cc7796804f9aa963daddfb6a65635328e2965e34525af1354b1.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\8a469d5bf8759cc7796804f9aa963daddfb6a65635328e2965e34525af1354b1.dll2⤵
- Modifies registry class
PID:4912