Analysis
-
max time kernel
126s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 23:19
Static task
static1
Behavioral task
behavioral1
Sample
c8b6cea9447d9b07cfcf9e7d34792aaf097f01c59f4778ff43c7ab3446685d8b.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
c8b6cea9447d9b07cfcf9e7d34792aaf097f01c59f4778ff43c7ab3446685d8b.dll
-
Size
172KB
-
MD5
0bd12bb0b5b270f069b69300ab58ff19
-
SHA1
c8074b2d4ff234030d04aaaab0379fc27e4269f1
-
SHA256
c8b6cea9447d9b07cfcf9e7d34792aaf097f01c59f4778ff43c7ab3446685d8b
-
SHA512
b8f308d78b94d22bf9370ed5d9dabb77c1751fbc9f1a4fa4dc51565e06e26e3c4fa7d20dec140ab6c00ec3202dc1f917059186e5e195a87b31edd1a86576dab9
-
SSDEEP
3072:cVILMQHLsDa5ZOqX0wt7V+N2U6OYuYMy+X5Hp8O7djf5JcUyC:czQHLsm5ZOre7V+ABJuYMychdjf5h
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4E78303-A521-31AE-B881-8E834D2958E8} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B4E78303-A521-31AE-B881-8E834D2958E8}\IExplore = "1" regsvr32.exe -
Modifies registry class 29 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\ = "IDOMPeek" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B4E78303-A521-31AE-B881-8E834D2958E8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1}\1.0\ = "LIB" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B4E78303-A521-31AE-B881-8E834D2958E8}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c8b6cea9447d9b07cfcf9e7d34792aaf097f01c59f4778ff43c7ab3446685d8b.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\TypeLib\ = "{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c8b6cea9447d9b07cfcf9e7d34792aaf097f01c59f4778ff43c7ab3446685d8b.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B4E78303-A521-31AE-B881-8E834D2958E8}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B4E78303-A521-31AE-B881-8E834D2958E8}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\ = "IDOMPeek" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\TypeLib\ = "{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C2D2EE26-99ED-324C-BEDB-C2797D90332D}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B4E78303-A521-31AE-B881-8E834D2958E8}\ = "D" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43BF4DB8-9520-381B-BBC0-DDE8CCD7ECC1}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid process target process PID 1316 wrote to memory of 4760 1316 regsvr32.exe regsvr32.exe PID 1316 wrote to memory of 4760 1316 regsvr32.exe regsvr32.exe PID 1316 wrote to memory of 4760 1316 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c8b6cea9447d9b07cfcf9e7d34792aaf097f01c59f4778ff43c7ab3446685d8b.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c8b6cea9447d9b07cfcf9e7d34792aaf097f01c59f4778ff43c7ab3446685d8b.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4760-132-0x0000000000000000-mapping.dmp