Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 19:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3db7eb03713bb7224ff0ad561f6d1c02.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
3db7eb03713bb7224ff0ad561f6d1c02.dll
-
Size
104KB
-
MD5
3db7eb03713bb7224ff0ad561f6d1c02
-
SHA1
0aec613acd226df16dac35e9fd8198835fd9c6cf
-
SHA256
10e4ee65f486a1d741d8528240e8095d009c098aea8977560f43bd6c012d7233
-
SHA512
f37cdc13864da402d09b4f28b4bc8db821519bcd777b6f8059b50d7982a049e9da7515d2e8200e3c291b23f3202fe3907883add7744e0271af53fb0c9dd17f17
-
SSDEEP
3072:KocS9tBQPz5gxqZe5fhtveBuD4jvwMX72L1pTWo:CS7BQaoZYtvAuqfKn
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2124-2-0x00000000006A0000-0x00000000006D7000-memory.dmp upx behavioral1/memory/2124-3-0x00000000006A0000-0x00000000006D7000-memory.dmp upx behavioral1/memory/2124-4-0x00000000006A0000-0x00000000006D7000-memory.dmp upx behavioral1/memory/2124-6-0x00000000006A0000-0x00000000006D7000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1434F511-581F-475B-B53F-AD7D4C361E4F} rundll32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1434F511-581F-475B-B53F-AD7D4C361E4F}\InprocServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1434F511-581F-475B-B53F-AD7D4C361E4F} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1434F511-581F-475B-B53F-AD7D4C361E4F}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3db7eb03713bb7224ff0ad561f6d1c02.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1434F511-581F-475B-B53F-AD7D4C361E4F}\InprocServer32\ThreadingModel = "apartment" rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2124 1744 rundll32.exe 28 PID 1744 wrote to memory of 2124 1744 rundll32.exe 28 PID 1744 wrote to memory of 2124 1744 rundll32.exe 28 PID 1744 wrote to memory of 2124 1744 rundll32.exe 28 PID 1744 wrote to memory of 2124 1744 rundll32.exe 28 PID 1744 wrote to memory of 2124 1744 rundll32.exe 28 PID 1744 wrote to memory of 2124 1744 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3db7eb03713bb7224ff0ad561f6d1c02.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3db7eb03713bb7224ff0ad561f6d1c02.dll,#12⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2124
-