Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 19:55
Behavioral task
behavioral1
Sample
025efd5e25602d0b75b6a9975dcfbf51.dll
Resource
win7-20231215-en
2 signatures
150 seconds
General
-
Target
025efd5e25602d0b75b6a9975dcfbf51.dll
-
Size
35KB
-
MD5
025efd5e25602d0b75b6a9975dcfbf51
-
SHA1
e9c01bdbfdcbb79e07d18385b6df2421e13deb35
-
SHA256
9d77c41646171e427e4693f8a74fe1a91fecb40663719ba2133f1c1144536760
-
SHA512
af46f0b96ee4f4fddb9888c6da4e06f7eb4c28cec92ccb1c87b933499063614fb1078ce314b17826c949c61f1b70cb2482db79a96adafb9bda7adf26d30179d4
-
SSDEEP
768:QIgVA17rcsh1nVNhJLeh6plqhH1eh2bQMoB:TgG7rv7jhlekzqhHMIbQHB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/760-0-0x0000000010000000-0x000000001001A000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DF5EF25D-0870-7002-B63D-48D18AA79926} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DF5EF25D-0870-7002-B63D-48D18AA79926}\ = "Windows Media" regsvr32.exe -
Modifies registry class 50 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5473378F-410E-401B-AAB3-A196DF144470}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\025EFD~1.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\ = "Microsoft(R) Windows Media Player" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\windowsmedia\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\windowsmedia.1\CLSID\ = "{DF5EF25D-0870-7002-B63D-48D18AA79926}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\ProgID\ = "windowsmedia.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\windowsmedia\CLSID\ = "{DF5EF25D-0870-7002-B63D-48D18AA79926}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\025efd5e25602d0b75b6a9975dcfbf51.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5473378F-410E-401B-AAB3-A196DF144470}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\ = "IIECatch" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5473378F-410E-401B-AAB3-A196DF144470}\1.0\ = "windowsmedia 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5473378F-410E-401B-AAB3-A196DF144470}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\ = "IIECatch" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\windowsmedia regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\windowsmedia\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\VersionIndependentProgID\ = "windowsmedia" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5473378F-410E-401B-AAB3-A196DF144470} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\TypeLib\ = "{5473378F-410E-401B-AAB3-A196DF144470}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\windowsmedia.1\ = "windowsmedia Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\ = "windowsmedia Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\windowsmedia.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5473378F-410E-401B-AAB3-A196DF144470}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5473378F-410E-401B-AAB3-A196DF144470}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5473378F-410E-401B-AAB3-A196DF144470}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\TypeLib\ = "{5473378F-410E-401B-AAB3-A196DF144470}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5473378F-410E-401B-AAB3-A196DF144470}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\windowsmedia.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\windowsmedia\ = "windowsmedia Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF5EF25D-0870-7002-B63D-48D18AA79926}\TypeLib\ = "{5473378F-410E-401b-AAB3-A196DF144470}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A9D5CDD2-53FF-4DD7-9991-E2C568609F0F}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\windowsmedia\CurVer\ = "windowsmedia.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5473378F-410E-401B-AAB3-A196DF144470}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5473378F-410E-401B-AAB3-A196DF144470}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\025efd5e25602d0b75b6a9975dcfbf51.dll" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 760 regsvr32.exe 760 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1396 wrote to memory of 760 1396 regsvr32.exe 88 PID 1396 wrote to memory of 760 1396 regsvr32.exe 88 PID 1396 wrote to memory of 760 1396 regsvr32.exe 88
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\025efd5e25602d0b75b6a9975dcfbf51.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\025efd5e25602d0b75b6a9975dcfbf51.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:760
-