Analysis
-
max time kernel
184s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c.dll
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c.dll
-
Size
104KB
-
MD5
53431a289eff001da16847d1080d568b
-
SHA1
42176c6d22bfe4851b1da18928268801f5b82d87
-
SHA256
dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c
-
SHA512
8ac4bc6b219e28ff13002410e58cbe69dedfa4a1f6b401a0663e6753ea16206e94ebec91cbdda78a0035c420aa6df3e9dd68a21f4c016bf6ac1bcb2f3e615bd4
-
SSDEEP
3072:Nv4+Adu6bpp+WLznSp5CHxd8ksX8INGA34yXQuEg0:Nu/zxHrbsXLZcuEN
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9048135B-EF09-4FDD-89A2-CEACC7388FC0} regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9048135B-EF09-4FDD-89A2-CEACC7388FC0}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9048135B-EF09-4FDD-89A2-CEACC7388FC0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9048135B-EF09-4FDD-89A2-CEACC7388FC0}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9048135B-EF09-4FDD-89A2-CEACC7388FC0}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4900 1856 regsvr32.exe 82 PID 1856 wrote to memory of 4900 1856 regsvr32.exe 82 PID 1856 wrote to memory of 4900 1856 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\dc4f307982b440e2921e835393cba7f9dfaaa063d73318e74ae16a2e83a06c1c.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4900
-