Analysis
-
max time kernel
147s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 20:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
39eca13489254fae979125db56b92baa.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
39eca13489254fae979125db56b92baa.exe
-
Size
75KB
-
MD5
39eca13489254fae979125db56b92baa
-
SHA1
85aea2864cbe849bbd73ae32075ab9da284dda70
-
SHA256
fe69f08d2f2832770063a008acd8c542b0f334bffd123b5b45dd5a8107da0235
-
SHA512
5cb2d8235693d49b37e72678e96a5ab05d20ca0e506a9b7aa1f7f44d822f98b8fa5a64f8cd109b88e2fc08aab99d99be098729d99d2a2ef54d92ff2c998b6f17
-
SSDEEP
768:QTQodfJF4+PJjPiiMAoGrx+G3twHzVlvKF9ZQk5NAq2OSGNPgzVKZ75TIIx/65uM:Zodf7+8Q0Aq2+1g5QTSuM9fiS
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2616 regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} 39eca13489254fae979125db56b92baa.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{749B4F65-6F76-4263-A666-07642B79F1E3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{749B4F65-6F76-4263-A666-07642B79F1E3}\ regsvr32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{749B4F65-6F76-4263-A666-07642B79F1E3}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\BBDNS.Dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{749B4F65-6F76-4263-A666-07642B79F1E3}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{749B4F65-6F76-4263-A666-07642B79F1E3}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{749B4F65-6F76-4263-A666-07642B79F1E3}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{749B4F65-6F76-4263-A666-07642B79F1E3}\TypeLib\ = "{F5604774-9DDB-4DAA-8BE0-372044A910AA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{749B4F65-6F76-4263-A666-07642B79F1E3}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{749B4F65-6F76-4263-A666-07642B79F1E3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{749B4F65-6F76-4263-A666-07642B79F1E3}\ = "BDN" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{749B4F65-6F76-4263-A666-07642B79F1E3}\InprocServer32 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4764 39eca13489254fae979125db56b92baa.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4764 wrote to memory of 2616 4764 39eca13489254fae979125db56b92baa.exe 16 PID 4764 wrote to memory of 2616 4764 39eca13489254fae979125db56b92baa.exe 16 PID 4764 wrote to memory of 2616 4764 39eca13489254fae979125db56b92baa.exe 16 PID 4764 wrote to memory of 2124 4764 39eca13489254fae979125db56b92baa.exe 18 PID 4764 wrote to memory of 2124 4764 39eca13489254fae979125db56b92baa.exe 18 PID 4764 wrote to memory of 2124 4764 39eca13489254fae979125db56b92baa.exe 18 PID 4764 wrote to memory of 860 4764 39eca13489254fae979125db56b92baa.exe 23 PID 4764 wrote to memory of 860 4764 39eca13489254fae979125db56b92baa.exe 23 PID 4764 wrote to memory of 860 4764 39eca13489254fae979125db56b92baa.exe 23 PID 4764 wrote to memory of 3240 4764 39eca13489254fae979125db56b92baa.exe 22 PID 4764 wrote to memory of 3240 4764 39eca13489254fae979125db56b92baa.exe 22 PID 4764 wrote to memory of 3240 4764 39eca13489254fae979125db56b92baa.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\39eca13489254fae979125db56b92baa.exe"C:\Users\Admin\AppData\Local\Temp\39eca13489254fae979125db56b92baa.exe"1⤵
- Installs/modifies Browser Helper Object
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Users\Admin\AppData\Roaming\Microsoft\BBDNS.Dll2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2616
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s /u "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_bho.dll2⤵PID:2124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\39eca13489254fae979125db56b92baa.exe2⤵PID:3240
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s /u "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_bho.dll2⤵PID:860
-