Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 00:21

General

  • Target

    1c899be2cc7a13607f2ea95d2ee75750.dll

  • Size

    166KB

  • MD5

    1c899be2cc7a13607f2ea95d2ee75750

  • SHA1

    6ac705bb1a8977c4c30d8428d219cae32404d25f

  • SHA256

    d47432e6302128108b48260cd096f856edab9e2ae7576726f8be14e59dd9f2c7

  • SHA512

    b87cc4ad4644f78570d707f7c52cd0df51ff7da39ba0fd68bca09ecf1d4976a0b4280173f51c161188d2b1048567142093bbe4b268ac11e537012c83a215e0ee

  • SSDEEP

    3072:UCTjEopzYpxRBwRzEVw6U3bbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU75Mp:7jTWpxbSz7wvP6bQ7yMP+DE8275M9W2H

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies registry class 52 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\SysWOW64\regsvr32.exe
    /s C:\Users\Admin\AppData\Local\Temp\1c899be2cc7a13607f2ea95d2ee75750.dll
    1⤵
    • Installs/modifies Browser Helper Object
    • Writes to the Master Boot Record (MBR)
    • Modifies registry class
    PID:1372
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\1c899be2cc7a13607f2ea95d2ee75750.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1372-2-0x0000000000110000-0x0000000000113000-memory.dmp

    Filesize

    12KB

  • memory/1372-1-0x0000000000170000-0x00000000001A0000-memory.dmp

    Filesize

    192KB

  • memory/1372-0-0x0000000010000000-0x000000001003A000-memory.dmp

    Filesize

    232KB