Analysis
-
max time kernel
266s -
max time network
326s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 21:09
Behavioral task
behavioral1
Sample
919f6ed85013b5b628f3f11ee03a975e6e275dc9cf89cb36719ef311581f3136.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
919f6ed85013b5b628f3f11ee03a975e6e275dc9cf89cb36719ef311581f3136.dll
-
Size
63KB
-
MD5
7345998b3157ee7bb6cb1064d00565a3
-
SHA1
0fd33aa733c3a0a1e6caabff8f668c46b2949bca
-
SHA256
919f6ed85013b5b628f3f11ee03a975e6e275dc9cf89cb36719ef311581f3136
-
SHA512
ff4b809a540188b2f82f80ea3c25b125651f3ba6e77fa9c956a43fa51a74580e50d6e77bbb666a425a48757d9b2f96992cfd63998a8890114b7ec4184cc3389c
-
SSDEEP
768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoL0:nJIMlt6RRdOm214/hVh4KhHnZY
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1420-133-0x0000000010000000-0x000000001002B000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{938A8A03-A938-4019-B764-03FF8D167D79} rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{938A8A03-A938-4019-B764-03FF8D167D79} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{938A8A03-A938-4019-B764-03FF8D167D79}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{938A8A03-A938-4019-B764-03FF8D167D79}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\919f6ed85013b5b628f3f11ee03a975e6e275dc9cf89cb36719ef311581f3136.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{938A8A03-A938-4019-B764-03FF8D167D79}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4532 wrote to memory of 1420 4532 rundll32.exe 81 PID 4532 wrote to memory of 1420 4532 rundll32.exe 81 PID 4532 wrote to memory of 1420 4532 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\919f6ed85013b5b628f3f11ee03a975e6e275dc9cf89cb36719ef311581f3136.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\919f6ed85013b5b628f3f11ee03a975e6e275dc9cf89cb36719ef311581f3136.dll,#12⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1420
-