Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 12:08
Behavioral task
behavioral1
Sample
dcfd4edbacc617c5708618d221ac4bebe96c3d1b38203586da669f6554891dfa.dll
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
dcfd4edbacc617c5708618d221ac4bebe96c3d1b38203586da669f6554891dfa.dll
-
Size
118KB
-
MD5
655ce55649167ab0f59797a69de1a544
-
SHA1
da90a491c53fcec273c56497df77d828c0a7e9d2
-
SHA256
dcfd4edbacc617c5708618d221ac4bebe96c3d1b38203586da669f6554891dfa
-
SHA512
84857b438c3f7dbad7b652cf17352a6da7d73870c02bd5164fde06513c324d8d187a41d3cefb120e5b464074e5b0925ebec761f9f09522aa5750f208897cd81e
-
SSDEEP
1536:+yGnoS9s4hQO2OH09HKZ5QlIS3TlGwYfuH1yUBLewZQ:+y79tOH09H456jQs1yUw
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A} regsvr32.exe -
Modifies registry class 42 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A}\VersionIndependentProgID\ = "IEHlprObj.IEHlprObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\ = "IEHlprObj Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dcfd4edbacc617c5708618d221ac4bebe96c3d1b38203586da669f6554891dfa.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\TypeLib\ = "{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\ = "IIEHlprObj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID\ = "{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A}\ProgID\ = "IEHlprObj.IEHlprObj.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A}\1.0\ = "IEHelper 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\ = "IEHlprObj Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer\ = "IEHlprObj.IEHlprObj.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\TypeLib\ = "{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\ = "IIEHlprObj" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dcfd4edbacc617c5708618d221ac4bebe96c3d1b38203586da669f6554891dfa.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{34CF11D2-ACC7-4DE6-BBB8-5FBE05BEE24A}\ = "IEHlprObj Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{34CF11D8-ACC7-4DE6-BBB8-5FBE05BEE24A}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34CF11D1-ACC7-4DE6-BBB8-5FBE05BEE24A}\TypeLib regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3312 regsvr32.exe 3312 regsvr32.exe 3312 regsvr32.exe 3312 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3692 wrote to memory of 3312 3692 regsvr32.exe 80 PID 3692 wrote to memory of 3312 3692 regsvr32.exe 80 PID 3692 wrote to memory of 3312 3692 regsvr32.exe 80
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\dcfd4edbacc617c5708618d221ac4bebe96c3d1b38203586da669f6554891dfa.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\dcfd4edbacc617c5708618d221ac4bebe96c3d1b38203586da669f6554891dfa.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3312
-