Analysis

  • max time kernel
    140s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 18:27

General

  • Target

    006ebd8bc54b3a4949535dd74c0a9602.dll

  • Size

    97KB

  • MD5

    006ebd8bc54b3a4949535dd74c0a9602

  • SHA1

    36e292d9d259e253a85dbe91385de8af53d8b161

  • SHA256

    c175542b58e83a69787a5fb0a4812c919451cd50469c26a60704078a26719b15

  • SHA512

    c9dcc948e76da5a360e6688589a411add2cd188c665f5cb08154447a8e59679d138816d2378b43f42a3595be658e3711c9e9e3bed689bf11468b0e62017ea7ab

  • SSDEEP

    1536:yYWOZkqoCy7kPwE/OAvuHEfoyfNtICiD7fjbkWNIj7Ly+bBxL9NzTIr6LB8l3:swkZlTd6oUo3fDqLXdxzz6IBM3

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\006ebd8bc54b3a4949535dd74c0a9602.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\006ebd8bc54b3a4949535dd74c0a9602.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2124-0-0x00000000006D0000-0x000000000070A000-memory.dmp

    Filesize

    232KB