Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0f191258cc5ddcd070ad33b3f9e09704.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
0f191258cc5ddcd070ad33b3f9e09704.dll
-
Size
10KB
-
MD5
0f191258cc5ddcd070ad33b3f9e09704
-
SHA1
f9b3f59e8aef33d8da05baf79aabb76d688253be
-
SHA256
db35f84a0a1fa562f11450a4a1f426a8bad693cbf7bd7778868a6c29ab4f3180
-
SHA512
d6e20302622d0f2d9a1d949b9d5442b2e1188e9cc521e9e144b7404d263a9e9fbec924a96170491278fd5a89d7d95211def46f7dca850e0030b169d4d3db97ba
-
SSDEEP
192:0yrKffmrOh8tuluJzVYJpPrV0EGBwKy+N5AT2J900XFTLJe//RNEZLHs:xr+VT2sxVRKwKyT2NXBLaRsLH
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D34F5D71-99E4-4D96-91CA-F4104F69B8AE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D34F5D71-99E4-4D96-91CA-F4104F69B8AE}\ regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{D34F5D71-99E4-4D96-91CA-F4104F69B8AE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D34F5D71-99E4-4D96-91CA-F4104F69B8AE}\ regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{D34F5D71-99E4-4D96-91CA-F4104F69B8AE}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D34F5D71-99E4-4D96-91CA-F4104F69B8AE}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0f191258cc5ddcd070ad33b3f9e09704.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D34F5D71-99E4-4D96-91CA-F4104F69B8AE}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1296 wrote to memory of 3256 1296 regsvr32.exe 14 PID 1296 wrote to memory of 3256 1296 regsvr32.exe 14 PID 1296 wrote to memory of 3256 1296 regsvr32.exe 14
Processes
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0f191258cc5ddcd070ad33b3f9e09704.dll1⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:3256
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0f191258cc5ddcd070ad33b3f9e09704.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1296