Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2ce1b929becb5cea9ede785aed58a30c.dll
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
2ce1b929becb5cea9ede785aed58a30c.dll
-
Size
152KB
-
MD5
2ce1b929becb5cea9ede785aed58a30c
-
SHA1
f32d4cb17cae255c81c625119bf65365133b21e4
-
SHA256
c57523f43987ba348d58cbef524b40c85bb11ce015729582cfc9f9f019fa4bea
-
SHA512
256b65215c59f52d39146fac71c01fb77dcadd8d3d75cb112498eebee7a22ea7349cb7574a373e08a29d4c59ba3e361b1a2e6383f1ee1ad9912bc9f7146fb247
-
SSDEEP
3072:tFLqHObxiqWPLmCFJu5hNl0l+ciqrr9P9rv4cPHnMTG5:tFLq+xijDmeu5hP0l5iUJPFPHnd5
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1673F93C-7C45-4846-A13A-C15172C4BD79} regsvr32.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default = 3cf97316457c4648a13ac15172c4bd79 regsvr32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1673F93C-7C45-4846-A13A-C15172C4BD79} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1673F93C-7C45-4846-A13A-C15172C4BD79}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1673F93C-7C45-4846-A13A-C15172C4BD79}\InprocServer32\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1673F93C-7C45-4846-A13A-C15172C4BD79}\InprocServer32\ThreadingModel = "Both" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4768 4376 regsvr32.exe 20 PID 4376 wrote to memory of 4768 4376 regsvr32.exe 20 PID 4376 wrote to memory of 4768 4376 regsvr32.exe 20
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2ce1b929becb5cea9ede785aed58a30c.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2ce1b929becb5cea9ede785aed58a30c.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:4768
-