Analysis

  • max time kernel
    117s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 12:50

General

  • Target

    40e7df2781fe5528e0e4796e493cd120.dll

  • Size

    580KB

  • MD5

    40e7df2781fe5528e0e4796e493cd120

  • SHA1

    eedc4590d74ec020051312ef20c691d67619c857

  • SHA256

    672ec28e305a6eda5d7ea5f2b00a8fef7c188fb83d90f68d25c6a8cae359dbc6

  • SHA512

    833b9cea5633c1db925828e8134d0d3d0d8f9af7b61096cbbf21de04aaa13812de67306bfb7a5e43c61f419d066d59dbf2d15b3a016d1a6e28a7c344e7368ba4

  • SSDEEP

    6144:MW7TJ2OqDBaZO/G0RZKe70Db/7YHYvpg98RGWWigSnGjD7aSucpUqd2qco+AO3GU:x12OkAO/nRZKfzRG3iO/lucj2qcPGp+

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\40e7df2781fe5528e0e4796e493cd120.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\40e7df2781fe5528e0e4796e493cd120.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2108-0-0x0000000000A30000-0x0000000000AC6000-memory.dmp

    Filesize

    600KB