Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 22:03
Behavioral task
behavioral1
Sample
b03a97edf63a457262895712385807ea5724ecedfc9c56d6c95061b50a04cb0b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b03a97edf63a457262895712385807ea5724ecedfc9c56d6c95061b50a04cb0b.dll
Resource
win10v2004-20221111-en
General
-
Target
b03a97edf63a457262895712385807ea5724ecedfc9c56d6c95061b50a04cb0b.dll
-
Size
116KB
-
MD5
679b34e25c48808edb9addca1080b53e
-
SHA1
286ea66cb5ac0f0c926cbff6ef790c68864adabf
-
SHA256
b03a97edf63a457262895712385807ea5724ecedfc9c56d6c95061b50a04cb0b
-
SHA512
ca6f22d73be4f79dee8d27329c391873d6a12aa003c4ec01bf70349f425b6aa36b2dd6e443ec4bea501f2c637b853a0370310d910e255ad6e426a6b05d7c71f9
-
SSDEEP
3072:J55DIrumIXyGZjVHVWUX7VY4v0XYelDVUX:j5s6VyGZjVHVeHplDVC
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{500BCA15-57A7-4eaf-8143-8C619470B13D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{500BCA15-57A7-4eaf-8143-8C619470B13D}\ = "XML module" regsvr32.exe -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\TypeLib\ = "{5D2631E5-8696-7543-50B2-F674CD4308EB}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\VersionIndependentProgID\ = "XML.XML" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XML.XML regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XML.XML\CLSID\ = "{500BCA15-57A7-4eaf-8143-8C619470B13D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b03a97edf63a457262895712385807ea5724ecedfc9c56d6c95061b50a04cb0b.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XML.XML.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\Install = "OK" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5D2631E5-8696-7543-50B2-F674CD4308EB}\.0\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b03a97edf63a457262895712385807ea5724ecedfc9c56d6c95061b50a04cb0b.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XML.XML\CurVer\ = "XML.XML.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\ProgID\ = "XML.XML.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\ = "XML Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XML.XML\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XML.XML.1\ = "XML Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XML.XML\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XML.XML\ = "XML Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XML.XML.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5D2631E5-8696-7543-50B2-F674CD4308EB} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5D2631E5-8696-7543-50B2-F674CD4308EB}\.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XML.XML.1\CLSID\ = "{500BCA15-57A7-4eaf-8143-8C619470B13D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5D2631E5-8696-7543-50B2-F674CD4308EB}\.0\ = "XML Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}\TypeLib regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1712 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1712 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1712 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1712 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1712 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1712 1668 regsvr32.exe 27 PID 1668 wrote to memory of 1712 1668 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b03a97edf63a457262895712385807ea5724ecedfc9c56d6c95061b50a04cb0b.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b03a97edf63a457262895712385807ea5724ecedfc9c56d6c95061b50a04cb0b.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1712
-