Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 02:44
Static task
static1
Behavioral task
behavioral1
Sample
24fc344f1ce4bb18616d93454ff773e0.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
24fc344f1ce4bb18616d93454ff773e0.dll
-
Size
409KB
-
MD5
24fc344f1ce4bb18616d93454ff773e0
-
SHA1
55f47545ab62a43049eae2fa9aa6e8604c603867
-
SHA256
ef48df8080be426e9fec5ebbdec7f9a553f47aab27e05afd8a2d76842d7bb6b2
-
SHA512
970a1ec8aa77680ef1dc7e4c70e93ebcb9a827f773110327b0f0e59b677bb6d866b0aa54f115e8e2dc7e0aefa1e8194a40a69ead574a8844a0aaa266f67f3626
-
SSDEEP
6144:873UkUpqsoJhZzbRNn3hbWE0n1hyCpM9lDMZl1ZB7JU5pckodfGBmubGrHDNY8sd:yTUpqfBsEEACpM9lQ3BFUbcvoqny8y7
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{3DE538FA-DDB6-40BB-ABFD-FE66CF579654} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{3DE538FA-DDB6-40BB-ABFD-FE66CF579654}\ regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{3DE538FA-DDB6-40BB-ABFD-FE66CF579654}\NoExplorer = "1" regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DE538FA-DDB6-40BB-ABFD-FE66CF579654} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DE538FA-DDB6-40BB-ABFD-FE66CF579654}\ = "Mini-Search" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DE538FA-DDB6-40BB-ABFD-FE66CF579654}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DE538FA-DDB6-40BB-ABFD-FE66CF579654}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\24fc344f1ce4bb18616d93454ff773e0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DE538FA-DDB6-40BB-ABFD-FE66CF579654}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3DE538FA-DDB6-40BB-ABFD-FE66CF579654}\InProcServer32 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2968 wrote to memory of 3052 2968 regsvr32.exe 28 PID 2968 wrote to memory of 3052 2968 regsvr32.exe 28 PID 2968 wrote to memory of 3052 2968 regsvr32.exe 28 PID 2968 wrote to memory of 3052 2968 regsvr32.exe 28 PID 2968 wrote to memory of 3052 2968 regsvr32.exe 28 PID 2968 wrote to memory of 3052 2968 regsvr32.exe 28 PID 2968 wrote to memory of 3052 2968 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\24fc344f1ce4bb18616d93454ff773e0.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\24fc344f1ce4bb18616d93454ff773e0.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:3052
-