Analysis

  • max time kernel
    43s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 14:13

General

  • Target

    bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513.dll

  • Size

    192KB

  • MD5

    8d4015bbd14c8e50015b8f91e9262f68

  • SHA1

    61b8615c49ff495c95eb70361dec1d94b99bca60

  • SHA256

    bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513

  • SHA512

    dbb5f6f03c64bcdc10f7d94790a6213cac122efaf275e8aade5612ce60e249330dc561476c523ad8be996a1af576a10a4c2f4942d8347e236a8f0f5a2315c99d

  • SSDEEP

    3072:XQ7pWdHCS+lwr3D1LeAOGGuL2+MSpFRe+nE285wGlEdUcKGv86:XYWdHCSX1LWGGuC3Spy282GlEdGGU6

Malware Config

Signatures

  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\bcbc236f8906cdb5b12e2ae1e557e62906b1c8dca30a6412a4614e65e6bbf513.dll
      2⤵
      • Sets file execution options in registry
      • Installs/modifies Browser Helper Object
      • Drops file in System32 directory
      • Modifies registry class
      PID:2000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1884-54-0x000007FEFC181000-0x000007FEFC183000-memory.dmp

    Filesize

    8KB

  • memory/2000-56-0x0000000076941000-0x0000000076943000-memory.dmp

    Filesize

    8KB