Analysis

  • max time kernel
    183s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 19:39

General

  • Target

    cdb23e70fb9ecca1ea94d998a6accdfc73c696616af3b644c8880978621839fa.dll

  • Size

    293KB

  • MD5

    79f43f06ab7c855f76c83df06f706381

  • SHA1

    42292e7e9a418af40418a71136ae63518eecaa37

  • SHA256

    cdb23e70fb9ecca1ea94d998a6accdfc73c696616af3b644c8880978621839fa

  • SHA512

    ef50e9cc38ce2927e7ae68a1604a787b79fcb6ce28b78222b07587efd8a4e058bf0e3ef7cd069f1f6ff78895d019f70753e3019e7f22b80892d1d5c45e5e687d

  • SSDEEP

    6144:NslnkPl3sHwdftosbnhRwQgFuga2lwD+KflFLQt:NslnY3sHwd1lbnhuQgFugatD+eJQ

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\cdb23e70fb9ecca1ea94d998a6accdfc73c696616af3b644c8880978621839fa.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\cdb23e70fb9ecca1ea94d998a6accdfc73c696616af3b644c8880978621839fa.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1336

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads