Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 21:46

General

  • Target

    04cbfe50d91d38f90adea0f2b12fb958.dll

  • Size

    156KB

  • MD5

    04cbfe50d91d38f90adea0f2b12fb958

  • SHA1

    2d4ef0307f770f03c65f1ec0232a94acdc1ad871

  • SHA256

    73f4b7d2523d1d6a9757090342ad40e5b3be09ecf2da053063f5c886b9da94da

  • SHA512

    a9c7f016285ee3b5c5a4410b230af5835769028bd4c40883cb58def7ef55214ac7b90081fd6c4d1fab4705fdbe81e4affc5649920937cb9f5c6256db8ba136eb

  • SSDEEP

    3072:aTbN4hax/tB2BJrKD4LKCoo+OmojbK6lUbIX:a3xH09a4LiO/nzX

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 31 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\SysWOW64\regsvr32.exe
    /s C:\Users\Admin\AppData\Local\Temp\04cbfe50d91d38f90adea0f2b12fb958.dll
    1⤵
    • Installs/modifies Browser Helper Object
    • Drops file in Windows directory
    • Modifies registry class
    PID:2464
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\04cbfe50d91d38f90adea0f2b12fb958.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads