Analysis

  • max time kernel
    143s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 06:52

General

  • Target

    0753b3537b1bc0ba834f7cfbedd162075dde1acd34d9b78fcd38082f31d773f0.dll

  • Size

    67KB

  • MD5

    7d67a6b971abbfbeedb524e3217686b0

  • SHA1

    d2c6d51ef206a0225768d345a8d309c11196cbe1

  • SHA256

    0753b3537b1bc0ba834f7cfbedd162075dde1acd34d9b78fcd38082f31d773f0

  • SHA512

    853cc61203723d3e0c5c5684ce371274195a6ec16611df4909d0ac17d3e2a39d1c19465f0f58b15e00b1ef7181cbe58b56c9e6efe69affaf7a2c6a7cadfc9f06

  • SSDEEP

    1536:0X0JWaBY8YeMdsgQFgCgDs4UldQ3nVy4L:0EBBYwMegugBsnldQT

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\0753b3537b1bc0ba834f7cfbedd162075dde1acd34d9b78fcd38082f31d773f0.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\0753b3537b1bc0ba834f7cfbedd162075dde1acd34d9b78fcd38082f31d773f0.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/896-133-0x0000000010000000-0x0000000010059000-memory.dmp

    Filesize

    356KB