Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 06:43
Behavioral task
behavioral1
Sample
1154378d77d4dd1eb83d40a3a0b6982f.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
1154378d77d4dd1eb83d40a3a0b6982f.dll
-
Size
86KB
-
MD5
1154378d77d4dd1eb83d40a3a0b6982f
-
SHA1
644be0a5651bff773e33fdfd0f5e9fda6dc92da3
-
SHA256
33088dd41a6fdeb0765939c7961793ad4eeb7d0d9cd9536dc94e883d8900148a
-
SHA512
cf56ca4b8752e64b00f0d78592bf85a1e6db1d20e5ec7fadd414d0f9b7784774c2e1150c7891000fd119376c1725dedb5e24ad026a142947f925ce7e357aba7b
-
SSDEEP
1536:XrrAQT0nbCfeqmBzmAeLtvdRis14SYBUZstrEg5ETfgQBVHi1U:XrrAQTQCrKliTixeAVQBxi1
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2752-0-0x0000000000400000-0x000000000043C000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E349A619-FCFF-47A0-88BC-CB82874B3FC3} regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E349A619-FCFF-47A0-88BC-CB82874B3FC3}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E349A619-FCFF-47A0-88BC-CB82874B3FC3} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E349A619-FCFF-47A0-88BC-CB82874B3FC3}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1154378d77d4dd1eb83d40a3a0b6982f.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E349A619-FCFF-47A0-88BC-CB82874B3FC3}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3544 wrote to memory of 2752 3544 regsvr32.exe 88 PID 3544 wrote to memory of 2752 3544 regsvr32.exe 88 PID 3544 wrote to memory of 2752 3544 regsvr32.exe 88
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1154378d77d4dd1eb83d40a3a0b6982f.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1154378d77d4dd1eb83d40a3a0b6982f.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2752
-