Analysis

  • max time kernel
    144s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 00:21

General

  • Target

    1c899be2cc7a13607f2ea95d2ee75750.dll

  • Size

    166KB

  • MD5

    1c899be2cc7a13607f2ea95d2ee75750

  • SHA1

    6ac705bb1a8977c4c30d8428d219cae32404d25f

  • SHA256

    d47432e6302128108b48260cd096f856edab9e2ae7576726f8be14e59dd9f2c7

  • SHA512

    b87cc4ad4644f78570d707f7c52cd0df51ff7da39ba0fd68bca09ecf1d4976a0b4280173f51c161188d2b1048567142093bbe4b268ac11e537012c83a215e0ee

  • SSDEEP

    3072:UCTjEopzYpxRBwRzEVw6U3bbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU75Mp:7jTWpxbSz7wvP6bQ7yMP+DE8275M9W2H

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 52 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\1c899be2cc7a13607f2ea95d2ee75750.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3528
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\1c899be2cc7a13607f2ea95d2ee75750.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:3952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3952-0-0x0000000010000000-0x000000001003A000-memory.dmp

    Filesize

    232KB

  • memory/3952-19-0x0000000000DA0000-0x0000000000DA1000-memory.dmp

    Filesize

    4KB

  • memory/3952-18-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

    Filesize

    4KB

  • memory/3952-17-0x0000000000D80000-0x0000000000D81000-memory.dmp

    Filesize

    4KB

  • memory/3952-16-0x0000000000D90000-0x0000000000D91000-memory.dmp

    Filesize

    4KB

  • memory/3952-15-0x0000000000D60000-0x0000000000D61000-memory.dmp

    Filesize

    4KB

  • memory/3952-14-0x0000000000D70000-0x0000000000D71000-memory.dmp

    Filesize

    4KB

  • memory/3952-13-0x0000000000D40000-0x0000000000D41000-memory.dmp

    Filesize

    4KB

  • memory/3952-12-0x0000000000D50000-0x0000000000D51000-memory.dmp

    Filesize

    4KB

  • memory/3952-11-0x0000000000D20000-0x0000000000D21000-memory.dmp

    Filesize

    4KB

  • memory/3952-10-0x0000000000D30000-0x0000000000D31000-memory.dmp

    Filesize

    4KB

  • memory/3952-9-0x0000000000D00000-0x0000000000D01000-memory.dmp

    Filesize

    4KB

  • memory/3952-8-0x0000000000D10000-0x0000000000D11000-memory.dmp

    Filesize

    4KB

  • memory/3952-7-0x00000000008F0000-0x00000000008F1000-memory.dmp

    Filesize

    4KB

  • memory/3952-6-0x00000000005B0000-0x00000000005B1000-memory.dmp

    Filesize

    4KB

  • memory/3952-5-0x00000000005A0000-0x00000000005A1000-memory.dmp

    Filesize

    4KB

  • memory/3952-4-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB

  • memory/3952-3-0x0000000000690000-0x0000000000691000-memory.dmp

    Filesize

    4KB

  • memory/3952-2-0x00000000006A0000-0x00000000006A3000-memory.dmp

    Filesize

    12KB

  • memory/3952-1-0x00000000006C0000-0x00000000006F0000-memory.dmp

    Filesize

    192KB