Analysis

  • max time kernel
    154s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 17:15

General

  • Target

    d0d752898b5599f56154429fbad87c25c55de3fc53b5b02e7fa7a99901820c59.dll

  • Size

    112KB

  • MD5

    b42b7b3e95922e1e10fa7545750ba3ca

  • SHA1

    5622b1be720efb6783a96ae80ad977b05235646c

  • SHA256

    d0d752898b5599f56154429fbad87c25c55de3fc53b5b02e7fa7a99901820c59

  • SHA512

    6d253db2aa1b2a803a247339bc2b40f9be6cf536ee2f996ed329377657f7dc5223bc4cd215fa9a8135103cb0a17831813187da602a50d62b0f51650bb1d9802a

  • SSDEEP

    1536:qyGtoS9sVmo7uuTMNHCZ8pIKFcUjBtcwkgS/81yUeb7DpmZ1Ek:qyZ92uTMNHCZayH/81yU82

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\d0d752898b5599f56154429fbad87c25c55de3fc53b5b02e7fa7a99901820c59.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\d0d752898b5599f56154429fbad87c25c55de3fc53b5b02e7fa7a99901820c59.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:1516
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1516 -ip 1516
    1⤵
      PID:4072

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1516-133-0x0000000010000000-0x0000000010027000-memory.dmp

      Filesize

      156KB