Analysis

  • max time kernel
    205s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 23:07

General

  • Target

    c0e29693d1fe71a6b76956ddcfa61aecb05f0228d477910077116213d86f9389.dll

  • Size

    84KB

  • MD5

    fb7d6fcff4e8acf7d7edb09f8ad2dd28

  • SHA1

    09b666105f0c1b1176045a3fd77d185d3329e1aa

  • SHA256

    c0e29693d1fe71a6b76956ddcfa61aecb05f0228d477910077116213d86f9389

  • SHA512

    6c5b46ccefbf26226dd4dae661cbf756d2966b7249ef3dd1eb120a366af969241360d37674f17bd6ac25f305f7aeaf056bf861b04f349ee6aef2d0b42725c601

  • SSDEEP

    1536:3z4Upa6LiOx0tXrL5AEEbfnDXLq7mrxjNLrh7aPxjA3mSwTzFuAs9Fu:3zLe5cfnDXLq7Qxpnh7sxjApwV7s

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\c0e29693d1fe71a6b76956ddcfa61aecb05f0228d477910077116213d86f9389.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\c0e29693d1fe71a6b76956ddcfa61aecb05f0228d477910077116213d86f9389.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:3068

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3068-133-0x0000000010000000-0x000000001001C000-memory.dmp

          Filesize

          112KB

        • memory/3068-134-0x0000000010000000-0x000000001001C000-memory.dmp

          Filesize

          112KB