Analysis

  • max time kernel
    142s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 01:00

General

  • Target

    1ecf0b19fd1a89c871e349da48e6db2e.dll

  • Size

    633KB

  • MD5

    1ecf0b19fd1a89c871e349da48e6db2e

  • SHA1

    e5360d591bc4aa3be16f68256c6afb0b7c7c3991

  • SHA256

    bb82a5bccd5b3cecc1e79e8133323be8a735d2d2fa5f985c0229285db11b525a

  • SHA512

    dc0b25b65c737b7580e47d492e237f1179c5ad3ed506b0c53be177d8723acd623a33cadaa91915cebc4ce7fc00a555cd322d9c77786280124d6d9ed28af6709b

  • SSDEEP

    12288:1vc66CZwCbAfUSPg4EfQbNfk+kMsv2+yT7SRBaQY:KnCZjAfUa1NxkMsv2+tG

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\SysWOW64\regsvr32.exe
    /s C:\Users\Admin\AppData\Local\Temp\1ecf0b19fd1a89c871e349da48e6db2e.dll
    1⤵
    • Installs/modifies Browser Helper Object
    • Modifies registry class
    PID:4828
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\1ecf0b19fd1a89c871e349da48e6db2e.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads