Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
9c27fc43269832aa33a15b41e4ca6d2809d5cc0bb09455c7c14725b4f00626e4.dll
Resource
win7-20220901-en
3 signatures
150 seconds
General
-
Target
9c27fc43269832aa33a15b41e4ca6d2809d5cc0bb09455c7c14725b4f00626e4.dll
-
Size
473KB
-
MD5
cfa20f5f031c1557e8f39bc6f4228e29
-
SHA1
a7544508e4eec13fd6675db5d68449b1be357efc
-
SHA256
9c27fc43269832aa33a15b41e4ca6d2809d5cc0bb09455c7c14725b4f00626e4
-
SHA512
cae9bb5484dbe888a0a79ad55f5780a9c84258e2b8986aeecdcdede0ec9f1a0c6485dc87c73a7afb7bd50dc205d2911a6bfe0988df759ac4d50bd4c073a8fc8b
-
SSDEEP
12288:7mft8PTfDzdyExHtWTjI/U1a6q1mGL1lEkvj4u:Ktgf7ZtWrImI1Vvh
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{113B6A70-C68C-4AFA-901D-A08AA7CA4D5C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{113B6A70-C68C-4AFA-901D-A08AA7CA4D5C}\ regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{113B6A70-C68C-4AFA-901D-A08AA7CA4D5C}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{113B6A70-C68C-4AFA-901D-A08AA7CA4D5C}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\9c27fc43269832aa33a15b41e4ca6d2809d5cc0bb09455c7c14725b4f00626e4.VagaaÍ۸»ʱ´ú regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\9c27fc43269832aa33a15b41e4ca6d2809d5cc0bb09455c7c14725b4f00626e4.VagaaÍ۸»ʱ´ú\Clsid\ = "{113B6A70-C68C-4AFA-901D-A08AA7CA4D5C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{113B6A70-C68C-4AFA-901D-A08AA7CA4D5C}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{113B6A70-C68C-4AFA-901D-A08AA7CA4D5C}\ProgID\ = "9c27fc43269832aa33a15b41e4ca6d2809d5cc0bb09455c7c14725b4f00626e4.VagaaÍ۸»\u00adʱ´ú" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{113B6A70-C68C-4AFA-901D-A08AA7CA4D5C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{113B6A70-C68C-4AFA-901D-A08AA7CA4D5C}\ = "Ö§³Ö¶àÖÖÐ\u00adÒéµÄBT" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{113B6A70-C68C-4AFA-901D-A08AA7CA4D5C}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9c27fc43269832aa33a15b41e4ca6d2809d5cc0bb09455c7c14725b4f00626e4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\9c27fc43269832aa33a15b41e4ca6d2809d5cc0bb09455c7c14725b4f00626e4.VagaaÍ۸»ʱ´ú\ = "Ö§³Ö¶àÖÖÐ\u00adÒéµÄBT" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\9c27fc43269832aa33a15b41e4ca6d2809d5cc0bb09455c7c14725b4f00626e4.VagaaÍ۸»ʱ´ú\Clsid regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27 PID 1348 wrote to memory of 1204 1348 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\9c27fc43269832aa33a15b41e4ca6d2809d5cc0bb09455c7c14725b4f00626e4.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\9c27fc43269832aa33a15b41e4ca6d2809d5cc0bb09455c7c14725b4f00626e4.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1204
-