Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 04:07

General

  • Target

    b31efe0abc98697d8dbc1e2c7cb5d91616dd1074a075687e72766d7101041e40.dll

  • Size

    44KB

  • MD5

    8499001a9b7bc5d3ed23d35e68ff2803

  • SHA1

    0d3e25d598f5872121a152dd6667b689d38a09ef

  • SHA256

    b31efe0abc98697d8dbc1e2c7cb5d91616dd1074a075687e72766d7101041e40

  • SHA512

    5f25d624f09a6b654a8b242b8e5e45225008dede78d749e9527a889d4cd64f809761b6ff4e7da66ead317c6d969faa7ebcc93921867ea03dab9c80c5e7ae118b

  • SSDEEP

    384:KChuPiG8WlI1zhTMtOOZFs6BJHhm2j47CiJTBMu8RiTTCQwhR2WiywlUhEmKL4X:dXGVqHYLmaJBF4CWTWuwsTC12xTMX

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 46 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\b31efe0abc98697d8dbc1e2c7cb5d91616dd1074a075687e72766d7101041e40.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\b31efe0abc98697d8dbc1e2c7cb5d91616dd1074a075687e72766d7101041e40.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1160

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1160-56-0x00000000762E1000-0x00000000762E3000-memory.dmp

    Filesize

    8KB

  • memory/1284-54-0x000007FEFC211000-0x000007FEFC213000-memory.dmp

    Filesize

    8KB