Analysis

  • max time kernel
    145s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 22:04

General

  • Target

    a4ad151e5d28e7655ec1aa784e9d4769f2383943131aa8dbae31d3af8cf62c66.dll

  • Size

    705KB

  • MD5

    62756690055ca184fec4e924e270f3ee

  • SHA1

    b1d28dd015ad0656361b124d9ffc683e8b65cafc

  • SHA256

    a4ad151e5d28e7655ec1aa784e9d4769f2383943131aa8dbae31d3af8cf62c66

  • SHA512

    78cad4bd1779bc549ef4a17c2e9cb6ba4df4c0d47f89e59577e986f8a3899c5f130c7b953d2ce4742d65c160e646c78cccd70bbb699581de6f4f80bc7c0763e0

  • SSDEEP

    12288:wvcPAHG7qZ7/GmIzvjxLsd3REIGMGQPFhTiIb8wiQ:wvIAm7c3CtLQREI6QPbTKw

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a4ad151e5d28e7655ec1aa784e9d4769f2383943131aa8dbae31d3af8cf62c66.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4372
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\a4ad151e5d28e7655ec1aa784e9d4769f2383943131aa8dbae31d3af8cf62c66.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:3080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads