Analysis
-
max time kernel
185s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 03:23
Static task
static1
Behavioral task
behavioral1
Sample
cb779446600402fa7f5cf0a5b4b15eb8ea27bf200141a7f2cdf313e7d6d68a6f.dll
Resource
win7-20220901-en
windows7-x64
5 signatures
150 seconds
General
-
Target
cb779446600402fa7f5cf0a5b4b15eb8ea27bf200141a7f2cdf313e7d6d68a6f.dll
-
Size
374KB
-
MD5
84f789900628b350a7e0e28b6aca58a9
-
SHA1
19fe4b9111bb6d3fecf2b4d28941056bc2416ee7
-
SHA256
cb779446600402fa7f5cf0a5b4b15eb8ea27bf200141a7f2cdf313e7d6d68a6f
-
SHA512
16ea706a319610e59db8ac8dc9ef38c6f008ac7ccacbef640d2030dc0d9315edff119a78fe66a5909bfae02f0b696555ca2b03ab683fc634652224669d16a200
-
SSDEEP
6144:F9alH6kApcfgM0frvw/f7/zKLR52OCgToSf8k2pEvqyYP/dXPPF0Tn/sVt6xvjS:CNZrN+wnaF52OC+f8dioP1XGTn/qgvu
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B15155BF-797C-4DF6-B73C-2875ED9831C6} regsvr32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT\iexplore.exe = "1" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cb779446600402fa7f5cf0a5b4b15eb8ea27bf200141a7f2cdf313e7d6d68a6f.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B15155BF-797C-4DF6-B73C-2875ED9831C6}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1660 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3792 wrote to memory of 1660 3792 regsvr32.exe 81 PID 3792 wrote to memory of 1660 3792 regsvr32.exe 81 PID 3792 wrote to memory of 1660 3792 regsvr32.exe 81
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\cb779446600402fa7f5cf0a5b4b15eb8ea27bf200141a7f2cdf313e7d6d68a6f.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\cb779446600402fa7f5cf0a5b4b15eb8ea27bf200141a7f2cdf313e7d6d68a6f.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1660
-