Analysis

  • max time kernel
    37s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 11:07

General

  • Target

    f705ab554acea08b1efd566d5a5119288b36a3c1e65e26f7765ddfaeb2322ef4.dll

  • Size

    409KB

  • MD5

    6d9e1245dbfe770908444670bfe6d687

  • SHA1

    98b1c79d79812f2fc2c12094c7ef922f10547fda

  • SHA256

    f705ab554acea08b1efd566d5a5119288b36a3c1e65e26f7765ddfaeb2322ef4

  • SHA512

    d32b2ac7db8dae9f5e022fe17d55f0dcbf281bc9ae9cb18fba53251c25fa4cbed7c59599149e8e715901eef50a910649d1ac27946ae5f8cb6cd2a76875d6d92a

  • SSDEEP

    6144:ZsZnFR9H6jpyUHSxsM8shpIqZ5JUfn/vW5jYU35z59N4/IfkbVDqpvF0x3aQZ8pC:axN6jp1csM1pIqNOK1zrWgfaqpvq1Wp

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 17 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\f705ab554acea08b1efd566d5a5119288b36a3c1e65e26f7765ddfaeb2322ef4.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\f705ab554acea08b1efd566d5a5119288b36a3c1e65e26f7765ddfaeb2322ef4.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1780-55-0x0000000000000000-mapping.dmp

  • memory/1780-56-0x0000000076321000-0x0000000076323000-memory.dmp

    Filesize

    8KB

  • memory/1780-57-0x00000000001B0000-0x0000000000219000-memory.dmp

    Filesize

    420KB

  • memory/1780-58-0x0000000010000000-0x0000000010065000-memory.dmp

    Filesize

    404KB

  • memory/1780-60-0x00000000001B0000-0x0000000000219000-memory.dmp

    Filesize

    420KB

  • memory/1780-61-0x0000000010000000-0x0000000010065000-memory.dmp

    Filesize

    404KB

  • memory/1792-54-0x000007FEFBD01000-0x000007FEFBD03000-memory.dmp

    Filesize

    8KB