Analysis
-
max time kernel
40s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c.dll
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c.dll
-
Size
104KB
-
MD5
53431a289eff001da16847d1080d568b
-
SHA1
42176c6d22bfe4851b1da18928268801f5b82d87
-
SHA256
dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c
-
SHA512
8ac4bc6b219e28ff13002410e58cbe69dedfa4a1f6b401a0663e6753ea16206e94ebec91cbdda78a0035c420aa6df3e9dd68a21f4c016bf6ac1bcb2f3e615bd4
-
SSDEEP
3072:Nv4+Adu6bpp+WLznSp5CHxd8ksX8INGA34yXQuEg0:Nu/zxHrbsXLZcuEN
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C678627B-450B-4355-A322-3D448331F20D} regsvr32.exe -
Modifies registry class 6 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C678627B-450B-4355-A322-3D448331F20D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C678627B-450B-4355-A322-3D448331F20D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C678627B-450B-4355-A322-3D448331F20D}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C678627B-450B-4355-A322-3D448331F20D}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1520 wrote to memory of 936 1520 regsvr32.exe regsvr32.exe PID 1520 wrote to memory of 936 1520 regsvr32.exe regsvr32.exe PID 1520 wrote to memory of 936 1520 regsvr32.exe regsvr32.exe PID 1520 wrote to memory of 936 1520 regsvr32.exe regsvr32.exe PID 1520 wrote to memory of 936 1520 regsvr32.exe regsvr32.exe PID 1520 wrote to memory of 936 1520 regsvr32.exe regsvr32.exe PID 1520 wrote to memory of 936 1520 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:936