Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
37df99ff1cf1d2f19ac2be6367a42cb0.dll
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
37df99ff1cf1d2f19ac2be6367a42cb0.dll
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
37df99ff1cf1d2f19ac2be6367a42cb0.dll
-
Size
154KB
-
MD5
37df99ff1cf1d2f19ac2be6367a42cb0
-
SHA1
03836e68bf3bf4193e85adc6715eb67ae7e7f3e7
-
SHA256
256e9b2ca5a6912e2ef4e07d8ba5ad102981d4bfd73d504fc1d0491d6845d1dc
-
SHA512
eab42dcf1c5cba88a93a08c3d276af117806fe0759fb0103b7bdd29df6d9f8ba04380252fe9524b73ffaeea0f665bdd2dab5c7a518cf13a93d7c2d25ca30c8f7
-
SSDEEP
3072:Z5C6S53iafGjvBqpPw2La3cJtxrxpA383JHyUj5to:HcdiIGrBMPwUzJXrxGMt7o
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\{eda1f0ec-18a7-c7a1-316a-6f398bb11a7d} = "C:\\Windows\\System32\\Rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\37df99ff1cf1d2f19ac2be6367a42cb0.dll\" DllStart" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8feb25d0-2619-02e3-ccb4-c5a4a3113399} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8feb25d0-2619-02e3-ccb4-c5a4a3113399}\NoExplorer = "\"\"" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8feb25d0-2619-02e3-ccb4-c5a4a3113399} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8feb25d0-2619-02e3-ccb4-c5a4a3113399}\ = "targetedbanner browser optimizer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8feb25d0-2619-02e3-ccb4-c5a4a3113399}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8feb25d0-2619-02e3-ccb4-c5a4a3113399}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\37df99ff1cf1d2f19ac2be6367a42cb0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8feb25d0-2619-02e3-ccb4-c5a4a3113399}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2240 wrote to memory of 4184 2240 regsvr32.exe 15 PID 2240 wrote to memory of 4184 2240 regsvr32.exe 15 PID 2240 wrote to memory of 4184 2240 regsvr32.exe 15
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\37df99ff1cf1d2f19ac2be6367a42cb0.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\37df99ff1cf1d2f19ac2be6367a42cb0.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4184
-