Analysis

  • max time kernel
    16s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 06:42

General

  • Target

    8f9e3de2cf0bd6088b372b954046ef88dfc6d8e65737228a15a8bf811519357f.dll

  • Size

    285KB

  • MD5

    b2f099f040f505b70c388069a4a39247

  • SHA1

    5dcf75cfc8effd7c031c925753b0bdc1a1913b7f

  • SHA256

    8f9e3de2cf0bd6088b372b954046ef88dfc6d8e65737228a15a8bf811519357f

  • SHA512

    1766e3fd13ef197f9b7f515b957be9009e6fbb0aecc2776528f5608b0e74d462ef6dff83e21553f99737e8e0782b7bbfd6a65486fb28f93dd3aba16d0d22429c

  • SSDEEP

    6144:61xRVAt79v04Z/OgiOYSHl7TBJiylefRKYw:61OV0iCwl7TrimefTw

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\8f9e3de2cf0bd6088b372b954046ef88dfc6d8e65737228a15a8bf811519357f.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\8f9e3de2cf0bd6088b372b954046ef88dfc6d8e65737228a15a8bf811519357f.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/864-54-0x000007FEFC0D1000-0x000007FEFC0D3000-memory.dmp

    Filesize

    8KB

  • memory/1608-56-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB