Analysis
-
max time kernel
43s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513.dll
Resource
win10v2004-20220812-en
General
-
Target
bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513.dll
-
Size
192KB
-
MD5
8d4015bbd14c8e50015b8f91e9262f68
-
SHA1
61b8615c49ff495c95eb70361dec1d94b99bca60
-
SHA256
bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513
-
SHA512
dbb5f6f03c64bcdc10f7d94790a6213cac122efaf275e8aade5612ce60e249330dc561476c523ad8be996a1af576a10a4c2f4942d8347e236a8f0f5a2315c99d
-
SSDEEP
3072:XQ7pWdHCS+lwr3D1LeAOGGuL2+MSpFRe+nE285wGlEdUcKGv86:XYWdHCSX1LWGGuC3Spy282GlEdGGU6
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\Windows\\system32\\ctfmon_no.exe" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA}\IExplore = "1" regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ctfmon_no.exe regsvr32.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AEC1D26D-7278-3BAC-B3E7-C736EB73A552}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\ = "IDOMPeek" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\TypeLib\ = "{AEC1D26D-7278-3BAC-B3E7-C736EB73A552}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\TypeLib\ = "{AEC1D26D-7278-3BAC-B3E7-C736EB73A552}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AEC1D26D-7278-3BAC-B3E7-C736EB73A552}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AEC1D26D-7278-3BAC-B3E7-C736EB73A552}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AEC1D26D-7278-3BAC-B3E7-C736EB73A552}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AEC1D26D-7278-3BAC-B3E7-C736EB73A552}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\CLSID\ = "{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AEC1D26D-7278-3BAC-B3E7-C736EB73A552}\1.0\ = "LIB" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AEC1D26D-7278-3BAC-B3E7-C736EB73A552}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\ = "D" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA}\ = "D" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AEC1D26D-7278-3BAC-B3E7-C736EB73A552} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AEC1D26D-7278-3BAC-B3E7-C736EB73A552}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AEC1D26D-7278-3BAC-B3E7-C736EB73A552}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E0FC924A-A7AD-3592-86DD-969A7E9F6DCA}\ = "IDOMPeek" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D\ = "D" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA}\ProgID\ = "D.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D\CLSID\ = "{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FB0DC35-54F4-3B4C-8358-373EB0A9B1EA}\VersionIndependentProgID\ = "D" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2000 1884 regsvr32.exe 28 PID 1884 wrote to memory of 2000 1884 regsvr32.exe 28 PID 1884 wrote to memory of 2000 1884 regsvr32.exe 28 PID 1884 wrote to memory of 2000 1884 regsvr32.exe 28 PID 1884 wrote to memory of 2000 1884 regsvr32.exe 28 PID 1884 wrote to memory of 2000 1884 regsvr32.exe 28 PID 1884 wrote to memory of 2000 1884 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513.dll2⤵
- Sets file execution options in registry
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
PID:2000
-