Analysis

  • max time kernel
    16s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 01:55

General

  • Target

    c01ed948c6c5e96800deb0aa6c7a525ae81153ec44a651a66f177c8e20699a37.dll

  • Size

    169KB

  • MD5

    480676fc2d1e3434c64b2e517c1e14e0

  • SHA1

    715b9d9635673ef26091e2bdd42ed29ec5e23a8c

  • SHA256

    c01ed948c6c5e96800deb0aa6c7a525ae81153ec44a651a66f177c8e20699a37

  • SHA512

    8274941106793168408ece1cd7603e5c469d37486ac13d8e2308310b5e2ffe00ae5bfcd2a55fc46ebaeef2dceaa54bb670a3c3963c34de592482c884a1dd34aa

  • SSDEEP

    1536:ay7eou9lNviK12P0fnzaXaYqIB+HPxrVB2o5/dqB86ukfmi1yrTj:ayhw32P0fnz2avT61y

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\c01ed948c6c5e96800deb0aa6c7a525ae81153ec44a651a66f177c8e20699a37.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\c01ed948c6c5e96800deb0aa6c7a525ae81153ec44a651a66f177c8e20699a37.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1780-54-0x000007FEFC471000-0x000007FEFC473000-memory.dmp

    Filesize

    8KB

  • memory/2016-56-0x00000000761E1000-0x00000000761E3000-memory.dmp

    Filesize

    8KB