Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 04:07
Behavioral task
behavioral1
Sample
ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1.dll
Resource
win7-20220901-en
3 signatures
150 seconds
General
-
Target
ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1.dll
-
Size
269KB
-
MD5
dfd6f5df0b944b7b595cf95898150f05
-
SHA1
c85bc9ee029fb84775ba0e8595786fdc990e7699
-
SHA256
ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1
-
SHA512
b44383729d5f509227ea0663502642790df885809707e4aea1f9329d8bee73e3cece2aadb49a92a7d4e27f769ff22a43d855dfbd34c0bfe663936e0b58763b21
-
SSDEEP
6144:QtTLYhM5ZISvGCzUm5XxRSFTcwENDIg76k2RwuJ/09kLgd:QtTb5iFm5XfSDoDERwuJxg
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-DF88-3C5D-3EBC-5A79B99EDB4B} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DF88-3C5D-3EBC-5A79B99EDB4B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DF88-3C5D-3EBC-5A79B99EDB4B}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1.sb\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DF88-3C5D-3EBC-5A79B99EDB4B}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DF88-3C5D-3EBC-5A79B99EDB4B}\ProgID\ = "ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1.sb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DF88-3C5D-3EBC-5A79B99EDB4B}\ = "sb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DF88-3C5D-3EBC-5A79B99EDB4B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-DF88-3C5D-3EBC-5A79B99EDB4B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1.sb regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1.sb\ = "sb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1.sb\Clsid\ = "{CC01FC6C-DF88-3C5D-3EBC-5A79B99EDB4B}" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ee7146528d4434bed0b7e3b2a2ffd548e2185a65947b44e0bef33e0d916215f1.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1204
-