Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
03db1cba8255915a78c896972b9cdd92.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
03db1cba8255915a78c896972b9cdd92.dll
-
Size
708KB
-
MD5
03db1cba8255915a78c896972b9cdd92
-
SHA1
2521af9111741b817746d203d920f2b38380ccdc
-
SHA256
0ad58a3f884f9c4d6f303973b5c134a4d32320f2e0faf1714d71f2a01974f237
-
SHA512
3bc418655e7815777489ab232a7fda46bfd675661894691764df909523d652578d5314f15cdc4c8d58f708e3f77c31bb68be919fd819a923b618776ec1e4811f
-
SSDEEP
6144:ru7DF9KUvX20i3gu/dbjMM2JwmHCtZJZObUD68wpPfeO1TnsCKZ4HMK2:r0ZvO0inF3MMmA/eUD68wBhK4R
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{397D7D63-816E-4ECF-8761-775C932C5CF1} regsvr32.exe -
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{397D7D63-816E-4ECF-8761-775C932C5CF1}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{792993D0-6FF5-4EF6-ACBA-97089743B16C}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{792993D0-6FF5-4EF6-ACBA-97089743B16C}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{792993D0-6FF5-4EF6-ACBA-97089743B16C}\1.0\ = "iDonate 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{792993D0-6FF5-4EF6-ACBA-97089743B16C}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{397D7D63-816E-4ECF-8761-775C932C5CF1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{792993D0-6FF5-4EF6-ACBA-97089743B16C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\ = "IiDonate" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\TypeLib\ = "{792993D0-6FF5-4EF6-ACBA-97089743B16C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\TypeLib\ = "{792993D0-6FF5-4EF6-ACBA-97089743B16C}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{397D7D63-816E-4ECF-8761-775C932C5CF1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\03db1cba8255915a78c896972b9cdd92.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{792993D0-6FF5-4EF6-ACBA-97089743B16C}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{397D7D63-816E-4ECF-8761-775C932C5CF1}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{792993D0-6FF5-4EF6-ACBA-97089743B16C}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\ = "IiDonate" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{792993D0-6FF5-4EF6-ACBA-97089743B16C}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{792993D0-6FF5-4EF6-ACBA-97089743B16C}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{792993D0-6FF5-4EF6-ACBA-97089743B16C}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\03db1cba8255915a78c896972b9cdd92.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{97DEA3CB-DB02-4DCA-A86C-C891DF24E6B1}\ProxyStubClsid32 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3792 wrote to memory of 640 3792 regsvr32.exe 86 PID 3792 wrote to memory of 640 3792 regsvr32.exe 86 PID 3792 wrote to memory of 640 3792 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\03db1cba8255915a78c896972b9cdd92.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\03db1cba8255915a78c896972b9cdd92.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:640
-