Analysis

  • max time kernel
    304s
  • max time network
    440s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 05:42

General

  • Target

    f90bba10a5e386c525d0e2f065f6efdb6a78f97ae7c8bdf961ed2d79762b02bf.dll

  • Size

    473KB

  • MD5

    90522c6c55caf60ea932311ebead42d4

  • SHA1

    26913e7da2b4012d59cad8d4e6d9ff501a704659

  • SHA256

    f90bba10a5e386c525d0e2f065f6efdb6a78f97ae7c8bdf961ed2d79762b02bf

  • SHA512

    41c45cdd9143a785b083165efb94e1d4f2feb5ddc294d367d16c56bfec9df9064ed63d0a1b9f4eea5e94178b2547ae44e4dce9882d402d34dd44f92818fc8ca6

  • SSDEEP

    12288:tmft8PTfDzdyExHtWTjI/U1a6q1mGL1lEkVEjBR:Etgf7ZtWrImI1VVED

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\f90bba10a5e386c525d0e2f065f6efdb6a78f97ae7c8bdf961ed2d79762b02bf.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\f90bba10a5e386c525d0e2f065f6efdb6a78f97ae7c8bdf961ed2d79762b02bf.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads