Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 20:32

General

  • Target

    NEAS.97c127a9da16df3d1ac2936645232c40.dll

  • Size

    67KB

  • MD5

    97c127a9da16df3d1ac2936645232c40

  • SHA1

    6165a51959693291672c6f0fcb02fd37a103d936

  • SHA256

    21a00f7726a032a887842d650fb1ce689a1d60b8a71ef0078b788cb063dac1ca

  • SHA512

    34877a85e226d07a68c45ddc760fc3474e4c277ef7f1d4e2b34f87980234613c9e89fb78653dbd728dcc06274735bbd63276ba54e04050101f7286daa56c5def

  • SSDEEP

    1536:xvTe+W6ilightyTi6pb39VENbPwFdBKDwpxtrsdHEd:xbhRwHtEiShqbPSJpxtN

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\NEAS.97c127a9da16df3d1ac2936645232c40.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\NEAS.97c127a9da16df3d1ac2936645232c40.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2000-0-0x0000000010000000-0x0000000010058000-memory.dmp

    Filesize

    352KB

  • memory/2000-1-0x00000000000C0000-0x00000000000C2000-memory.dmp

    Filesize

    8KB