Analysis

  • max time kernel
    30s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 19:39

General

  • Target

    cdb23e70fb9ecca1ea94d998a6accdfc73c696616af3b644c8880978621839fa.dll

  • Size

    293KB

  • MD5

    79f43f06ab7c855f76c83df06f706381

  • SHA1

    42292e7e9a418af40418a71136ae63518eecaa37

  • SHA256

    cdb23e70fb9ecca1ea94d998a6accdfc73c696616af3b644c8880978621839fa

  • SHA512

    ef50e9cc38ce2927e7ae68a1604a787b79fcb6ce28b78222b07587efd8a4e058bf0e3ef7cd069f1f6ff78895d019f70753e3019e7f22b80892d1d5c45e5e687d

  • SSDEEP

    6144:NslnkPl3sHwdftosbnhRwQgFuga2lwD+KflFLQt:NslnY3sHwd1lbnhuQgFugatD+eJQ

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\cdb23e70fb9ecca1ea94d998a6accdfc73c696616af3b644c8880978621839fa.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\cdb23e70fb9ecca1ea94d998a6accdfc73c696616af3b644c8880978621839fa.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1240-54-0x000007FEFBC41000-0x000007FEFBC43000-memory.dmp

    Filesize

    8KB

  • memory/1728-56-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB