Analysis
-
max time kernel
38s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
b4f9cb68f8c93e0e913546f722fb1f3bf5a51e52f73eee312ec5f9b2a44eb089.dll
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
b4f9cb68f8c93e0e913546f722fb1f3bf5a51e52f73eee312ec5f9b2a44eb089.dll
-
Size
694KB
-
MD5
3e396eee0527a73682644a199ac027b2
-
SHA1
d69b665fcc7f23e26d6f4496ad4481af7f26d375
-
SHA256
b4f9cb68f8c93e0e913546f722fb1f3bf5a51e52f73eee312ec5f9b2a44eb089
-
SHA512
2f5980a52bdbea5d78ddd609581ac3cfd9f1be1b6ff0628c01f54edf7285a9791f44ffe60f145aa43be2061450decf1683e16763e058c1621c779c5b429e2df1
-
SSDEEP
12288:R91ip6YcFUMrK4gFgM9G7Lgf0IXwMe9OKKhTHFLD:HU6HF70G7LgM6cEpTl
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{28255825-5182-8CAD-BDB8-6F52F8171758} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28255825-5182-8CAD-BDB8-6F52F8171758}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b4f9cb68f8c93e0e913546f722fb1f3bf5a51e52f73eee312ec5f9b2a44eb089.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28255825-5182-8CAD-BDB8-6F52F8171758}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\b4f9cb68f8c93e0e913546f722fb1f3bf5a51e52f73eee312ec5f9b2a44eb089.VaeTaCaExpDlib\ = "XenscAdsExyi" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\b4f9cb68f8c93e0e913546f722fb1f3bf5a51e52f73eee312ec5f9b2a44eb089.VaeTaCaExpDlib\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28255825-5182-8CAD-BDB8-6F52F8171758}\ = "XenscAdsExyi" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28255825-5182-8CAD-BDB8-6F52F8171758}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\b4f9cb68f8c93e0e913546f722fb1f3bf5a51e52f73eee312ec5f9b2a44eb089.VaeTaCaExpDlib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\b4f9cb68f8c93e0e913546f722fb1f3bf5a51e52f73eee312ec5f9b2a44eb089.VaeTaCaExpDlib\Clsid\ = "{28255825-5182-8CAD-BDB8-6F52F8171758}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28255825-5182-8CAD-BDB8-6F52F8171758}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28255825-5182-8CAD-BDB8-6F52F8171758}\ProgID\ = "b4f9cb68f8c93e0e913546f722fb1f3bf5a51e52f73eee312ec5f9b2a44eb089.VaeTaCaExpDlib" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{28255825-5182-8CAD-BDB8-6F52F8171758} regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1372 1640 regsvr32.exe 27 PID 1640 wrote to memory of 1372 1640 regsvr32.exe 27 PID 1640 wrote to memory of 1372 1640 regsvr32.exe 27 PID 1640 wrote to memory of 1372 1640 regsvr32.exe 27 PID 1640 wrote to memory of 1372 1640 regsvr32.exe 27 PID 1640 wrote to memory of 1372 1640 regsvr32.exe 27 PID 1640 wrote to memory of 1372 1640 regsvr32.exe 27
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b4f9cb68f8c93e0e913546f722fb1f3bf5a51e52f73eee312ec5f9b2a44eb089.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b4f9cb68f8c93e0e913546f722fb1f3bf5a51e52f73eee312ec5f9b2a44eb089.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1372
-