Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 05:27

General

  • Target

    5754237238b56b66141add29a766ff5d.dll

  • Size

    439KB

  • MD5

    5754237238b56b66141add29a766ff5d

  • SHA1

    7cb47557c3bd8b6da667375bffffcd47cd07a0f3

  • SHA256

    ad533cdfbc679aba56595dfaea0dca174bfcd8f3348fea0fb9b141c05b927b9c

  • SHA512

    15a8a1f5751770c8b41fc71d36b49660a012d23fb616084078478d8941f76f02f6d460c7485c0d3c98dffab55c0702e304299478cb8ae12380c989c511d3d88d

  • SSDEEP

    6144:jomALXqkDjP0M2zFLSH3qO/I8CYv8hafV2a71z6jMI0Wy+i561+n6KvNg3+O/zPl:RALXqGjP0M2zi3dhz6me1+nrvNg3fzd

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 10 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\5754237238b56b66141add29a766ff5d.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\5754237238b56b66141add29a766ff5d.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2180-0-0x00000000007C0000-0x0000000000832000-memory.dmp

    Filesize

    456KB