Analysis

  • max time kernel
    237s
  • max time network
    311s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 16:57

General

  • Target

    ff92a9ee423fab6d01765d16965e69d5c8e3ab76ee4fa80ccd8012bba4a8926b.dll

  • Size

    166KB

  • MD5

    a3c013790b78f9d80376cdb9db5ec230

  • SHA1

    7b2c1b715e5ec01c5ab71edbb336b94f021c00a7

  • SHA256

    ff92a9ee423fab6d01765d16965e69d5c8e3ab76ee4fa80ccd8012bba4a8926b

  • SHA512

    4696456e158fa5394cc597bf4eeb5cba11703e1e885ba540365d4860fc58e40b229fd29b96324d8e364ac05a4ee13c6f906c2b6790d93d8f033c398e02331c16

  • SSDEEP

    3072:8vadMKspOXTEK5VIFWmMVFenbNS+cNPOo9/ErgmhYDXv:eaGdiEmLl0bc4oghYDXv

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 41 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ff92a9ee423fab6d01765d16965e69d5c8e3ab76ee4fa80ccd8012bba4a8926b.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\ff92a9ee423fab6d01765d16965e69d5c8e3ab76ee4fa80ccd8012bba4a8926b.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:3808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads