Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 00:41

General

  • Target

    1da4333958e4ff0948fcc46d8d3e160f.dll

  • Size

    216KB

  • MD5

    1da4333958e4ff0948fcc46d8d3e160f

  • SHA1

    ee422491eb63f24d21d716dece3d1ff508038b01

  • SHA256

    428bc46cc18ad32c1755049227e2c0acfbcfeb94ccb0a2503e5a4b737b130459

  • SHA512

    f22bcb09c42ece0ddd96d09c3da45794175168e4d29844c3505e27d9eac86d2e61d636b21ee39f0733bc8215fdd85c8f4c6258a5b1ba26e0bd43f7bc8e6503ec

  • SSDEEP

    3072:IUpn4UYYlbHKc904vMS/A0ts43rWTjfxWaW8ca0n0adLkwT6gEdFSpvWcOwJB:75YYlbb087oYB3rWTjfc39TAvSpvw6

Malware Config

Signatures

  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\1da4333958e4ff0948fcc46d8d3e160f.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\1da4333958e4ff0948fcc46d8d3e160f.dll
      2⤵
      • Sets file execution options in registry
      • Installs/modifies Browser Helper Object
      • Drops file in System32 directory
      • Modifies registry class
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads