Analysis

  • max time kernel
    4s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 10:30

General

  • Target

    a1cef6f9174df592068bbc882c4d327b9be8aaa4ed57f8b456fed0ce840a8b56.dll

  • Size

    107KB

  • MD5

    8c6f6dec6a3231119fc5a5e665f1b590

  • SHA1

    d6524c6caa03bc802e4285f39066a0cd02858a18

  • SHA256

    a1cef6f9174df592068bbc882c4d327b9be8aaa4ed57f8b456fed0ce840a8b56

  • SHA512

    1a67f76330691b4e81e744dd462b12b76a86079de31ab11dba4804ee109b4634b3ebf49be20358da133e0f451a9c58c7500c3ee0ac4ee477dc56d73e47504676

  • SSDEEP

    3072:ymYhY1Rut9zvQD54Cwx0N6lBYNa0ncXrC7ovJ:ghiROzva0xWa+7iJ

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 47 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a1cef6f9174df592068bbc882c4d327b9be8aaa4ed57f8b456fed0ce840a8b56.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\a1cef6f9174df592068bbc882c4d327b9be8aaa4ed57f8b456fed0ce840a8b56.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1356

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1356-56-0x0000000076AE1000-0x0000000076AE3000-memory.dmp

          Filesize

          8KB

        • memory/2028-54-0x000007FEFC2B1000-0x000007FEFC2B3000-memory.dmp

          Filesize

          8KB