Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
373268de5e9430439d807e6286b08b7a.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
373268de5e9430439d807e6286b08b7a.dll
-
Size
562KB
-
MD5
373268de5e9430439d807e6286b08b7a
-
SHA1
4e9d73216f26cab1c61e73e923cfd22586e31855
-
SHA256
c2e50066d393668ac88468ef0d1197ae8ca08c866edb3c6bf21483914ff12d13
-
SHA512
897bfe985c7818d328181da8ccaf20c175181f136e4b77d1b8220b8d993bc7c0acb871d3ea905bcaeea4a0fea85696ffd4cdd2d49347bd190022226caee4c2b1
-
SSDEEP
12288:n0Et9YDc/Tk4Po4wSSqodPF9C2vTgYn33xeRg:ltWDcw4o4Ts/9Ckn4R
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-AA48-72B2-EE17-F45AE17B127D} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\373268de5e9430439d807e6286b08b7a.sh regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-AA48-72B2-EE17-F45AE17B127D}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-AA48-72B2-EE17-F45AE17B127D}\ProgID\ = "373268de5e9430439d807e6286b08b7a.sh" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-AA48-72B2-EE17-F45AE17B127D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-AA48-72B2-EE17-F45AE17B127D}\ = "sh" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-AA48-72B2-EE17-F45AE17B127D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-AA48-72B2-EE17-F45AE17B127D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\373268de5e9430439d807e6286b08b7a.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-AA48-72B2-EE17-F45AE17B127D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\373268de5e9430439d807e6286b08b7a.sh\ = "sh" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\373268de5e9430439d807e6286b08b7a.sh\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\373268de5e9430439d807e6286b08b7a.sh\Clsid\ = "{CC01FC6C-AA48-72B2-EE17-F45AE17B127D}" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2208 2896 regsvr32.exe 28 PID 2896 wrote to memory of 2208 2896 regsvr32.exe 28 PID 2896 wrote to memory of 2208 2896 regsvr32.exe 28 PID 2896 wrote to memory of 2208 2896 regsvr32.exe 28 PID 2896 wrote to memory of 2208 2896 regsvr32.exe 28 PID 2896 wrote to memory of 2208 2896 regsvr32.exe 28 PID 2896 wrote to memory of 2208 2896 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\373268de5e9430439d807e6286b08b7a.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\373268de5e9430439d807e6286b08b7a.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2208
-