Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
18ab47758fa1cba0229113f3692c7147.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
18ab47758fa1cba0229113f3692c7147.dll
-
Size
11KB
-
MD5
18ab47758fa1cba0229113f3692c7147
-
SHA1
ad584ccdbc0dc8388cd351419147afab006752e3
-
SHA256
219e6358e47fb80a378cfa305088953e0db79cceccea85dbd0f2e67be30f9881
-
SHA512
772567d65630f4fdeb964d9e4f4b75ee505dc73c2ee0bc2d35f19d727d7d2a4916026d1341e0851f6c30063595d315334d9c84f1e3dd98cc0b2278bd63cf1372
-
SSDEEP
192:mE5nDSfThsnFstK6cj95pN9V09KvGBn5/vPa+NnnA65u+N8A:mE5+CnmgnV6KvK5/L5u
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383}\ regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383}\xxx = "xxx" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\18ab47758fa1cba0229113f3692c7147.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C2A1C5CB-C0EF-4689-9436-F62CCA1C5383}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4556 wrote to memory of 3036 4556 regsvr32.exe 15 PID 4556 wrote to memory of 3036 4556 regsvr32.exe 15 PID 4556 wrote to memory of 3036 4556 regsvr32.exe 15
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\18ab47758fa1cba0229113f3692c7147.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\18ab47758fa1cba0229113f3692c7147.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:3036
-