Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 06:39

General

  • Target

    ddbab241420776ff0e4301106069f08545cf9d4dc1aadbe96de35e76a4798b6f.dll

  • Size

    285KB

  • MD5

    8ecd7b7ee8753d6bff88ee8f08ad80af

  • SHA1

    9745bfb54bcec7848cfa30fdf33acb48852d39b1

  • SHA256

    ddbab241420776ff0e4301106069f08545cf9d4dc1aadbe96de35e76a4798b6f

  • SHA512

    ae5795330d063525e2132eb824d366bfcb61e7f15ce33a6839413200649f385026ff9bfcdab2d30911224bfb54eeafaa9241473c62d8f2d766110e390919e3c3

  • SSDEEP

    6144:61xRVAt79v04Z/OgiOYSHl7TBJJylefRKYw:61OV0iCwl7TrJmefTw

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ddbab241420776ff0e4301106069f08545cf9d4dc1aadbe96de35e76a4798b6f.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\ddbab241420776ff0e4301106069f08545cf9d4dc1aadbe96de35e76a4798b6f.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1744

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1064-54-0x000007FEFBDB1000-0x000007FEFBDB3000-memory.dmp

          Filesize

          8KB

        • memory/1744-56-0x0000000075BB1000-0x0000000075BB3000-memory.dmp

          Filesize

          8KB