Analysis
-
max time kernel
30s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
714a603139ff5b9abab7ba91684560f129d70b3d586c909fe73a535aab546cfc.dll
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
714a603139ff5b9abab7ba91684560f129d70b3d586c909fe73a535aab546cfc.dll
-
Size
752KB
-
MD5
10a72bdce4aad24f9c163306b3481c93
-
SHA1
7b8e6b6a35eed0d89dbf7c14c5840c7bd9ed7d38
-
SHA256
714a603139ff5b9abab7ba91684560f129d70b3d586c909fe73a535aab546cfc
-
SHA512
2aba8cc039522d4a2b87d6ecb29566ef795e5e8086b1d8934bc21f28248bbc2017da90c872cb2ec65ea7be25a49693f8649a5dfe4d530a31bb634db9971a92c5
-
SSDEEP
12288:PTeHUbWW0A3P+JzNiOQee7AZyd9hQKzGCOR6pndt44ZWplqSt0:y0H+/BQee7SyVQK2gPCrBS
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6415DEDE-0C99-4392-864A-6FB5C733ADF5} regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6415DEDE-0C99-4392-864A-6FB5C733ADF5} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6415DEDE-0C99-4392-864A-6FB5C733ADF5}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6415DEDE-0C99-4392-864A-6FB5C733ADF5}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6415DEDE-0C99-4392-864A-6FB5C733ADF5}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\714a603139ff5b9abab7ba91684560f129d70b3d586c909fe73a535aab546cfc.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6415DEDE-0C99-4392-864A-6FB5C733ADF5}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{6415DEDE-0C99-4392-864A-6FB5C733ADF5}\ = "Adobe Flash Player" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1088 wrote to memory of 308 1088 regsvr32.exe 28 PID 1088 wrote to memory of 308 1088 regsvr32.exe 28 PID 1088 wrote to memory of 308 1088 regsvr32.exe 28 PID 1088 wrote to memory of 308 1088 regsvr32.exe 28 PID 1088 wrote to memory of 308 1088 regsvr32.exe 28 PID 1088 wrote to memory of 308 1088 regsvr32.exe 28 PID 1088 wrote to memory of 308 1088 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\714a603139ff5b9abab7ba91684560f129d70b3d586c909fe73a535aab546cfc.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\714a603139ff5b9abab7ba91684560f129d70b3d586c909fe73a535aab546cfc.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:308
-