Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
1da4333958e4ff0948fcc46d8d3e160f.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1da4333958e4ff0948fcc46d8d3e160f.dll
Resource
win10v2004-20231215-en
General
-
Target
1da4333958e4ff0948fcc46d8d3e160f.dll
-
Size
216KB
-
MD5
1da4333958e4ff0948fcc46d8d3e160f
-
SHA1
ee422491eb63f24d21d716dece3d1ff508038b01
-
SHA256
428bc46cc18ad32c1755049227e2c0acfbcfeb94ccb0a2503e5a4b737b130459
-
SHA512
f22bcb09c42ece0ddd96d09c3da45794175168e4d29844c3505e27d9eac86d2e61d636b21ee39f0733bc8215fdd85c8f4c6258a5b1ba26e0bd43f7bc8e6503ec
-
SSDEEP
3072:IUpn4UYYlbHKc904vMS/A0ts43rWTjfxWaW8ca0n0adLkwT6gEdFSpvWcOwJB:75YYlbb087oYB3rWTjfc39TAvSpvw6
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "C:\\Windows\\system32\\ctfmon_oq.exe" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{81DE1D6C-F118-356F-A492-456652DEE05F} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{81DE1D6C-F118-356F-A492-456652DEE05F}\IExplore = "1" regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ctfmon_oq.exe regsvr32.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\ = "D" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81DE1D6C-F118-356F-A492-456652DEE05F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81DE1D6C-F118-356F-A492-456652DEE05F}\VersionIndependentProgID\ = "D" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\TypeLib\ = "{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81DE1D6C-F118-356F-A492-456652DEE05F}\ = "D" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\CLSID\ = "{81DE1D6C-F118-356F-A492-456652DEE05F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\ = "IDOMPeek" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D\CLSID\ = "{81DE1D6C-F118-356F-A492-456652DEE05F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81DE1D6C-F118-356F-A492-456652DEE05F}\ProgID\ = "D.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81DE1D6C-F118-356F-A492-456652DEE05F}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81DE1D6C-F118-356F-A492-456652DEE05F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\TypeLib\ = "{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\ = "IDOMPeek" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\D\ = "D" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\D\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81DE1D6C-F118-356F-A492-456652DEE05F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B625684-AB6F-3B09-AA4D-AD79ABDAA8D8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81DE1D6C-F118-356F-A492-456652DEE05F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81DE1D6C-F118-356F-A492-456652DEE05F}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1da4333958e4ff0948fcc46d8d3e160f.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67}\1.0\ = "LIB" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B63022C9-BAB3-3DFD-B0DF-BD1F64CFAA67}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1da4333958e4ff0948fcc46d8d3e160f.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2664 wrote to memory of 3376 2664 regsvr32.exe 88 PID 2664 wrote to memory of 3376 2664 regsvr32.exe 88 PID 2664 wrote to memory of 3376 2664 regsvr32.exe 88
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1da4333958e4ff0948fcc46d8d3e160f.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1da4333958e4ff0948fcc46d8d3e160f.dll2⤵
- Sets file execution options in registry
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
PID:3376
-