Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 22:32

General

  • Target

    16027d4027284b9e846294d1f3e23ca9.dll

  • Size

    286KB

  • MD5

    16027d4027284b9e846294d1f3e23ca9

  • SHA1

    208d9ec5173834d4bc655577ee22dc3e7508cb46

  • SHA256

    6c0c226e8a657e65d16a38a9911f1baa108067f8e354f430a85be412484eae00

  • SHA512

    4dbcc02b3f7230f1b8acfb699ee89e825a67f2518af6f6423f12bbee1177fa96847f40dc0dfccfe014b78f1a79cf793d10a2ebedae33b0195940b076d15c7a39

  • SSDEEP

    6144:lFwcLqg3g9ebxExkIRrWzXaayIN0KdTLl:kgpbxEKOrWzXaaynu

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\16027d4027284b9e846294d1f3e23ca9.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\16027d4027284b9e846294d1f3e23ca9.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads