Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 19:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
41c22d3cc889203fbf7b1693914de3fb.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
41c22d3cc889203fbf7b1693914de3fb.dll
-
Size
546KB
-
MD5
41c22d3cc889203fbf7b1693914de3fb
-
SHA1
a9f5931dd92e7a80be9532299be367f3855fb191
-
SHA256
f76d6a54a9010ad4044094cc19641f9c83085543479635353164e73e6c773255
-
SHA512
7f659cf13fd350cffd167aac68508a9209a398e8d11765415cfe416e0f9648a323d64c798d283d190c42e5663c84f06bf417192f4076980e2a38bb1fa896feaa
-
SSDEEP
12288:bisJfKjGOJV7+KYOri/PBmyaK6c38g9DVhTlYpWNr:bTEGW+1FLaisg9DLTl+WR
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{82FE757D-2859-454C-A4A3-D70416F731F8} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{82FE757D-2859-454C-A4A3-D70416F731F8}\ = "ExFlash" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{82FE757D-2859-454C-A4A3-D70416F731F8}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\41c22d3cc889203fbf7b1693914de3fb.GetFlash\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\41c22d3cc889203fbf7b1693914de3fb.GetFlash\Clsid\ = "{82FE757D-2859-454C-A4A3-D70416F731F8}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{82FE757D-2859-454C-A4A3-D70416F731F8}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{82FE757D-2859-454C-A4A3-D70416F731F8}\ProgID\ = "41c22d3cc889203fbf7b1693914de3fb.GetFlash" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{82FE757D-2859-454C-A4A3-D70416F731F8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{82FE757D-2859-454C-A4A3-D70416F731F8}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{82FE757D-2859-454C-A4A3-D70416F731F8}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\41c22d3cc889203fbf7b1693914de3fb.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\41c22d3cc889203fbf7b1693914de3fb.GetFlash regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\41c22d3cc889203fbf7b1693914de3fb.GetFlash\ = "ExFlash" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2040 1676 regsvr32.exe 28 PID 1676 wrote to memory of 2040 1676 regsvr32.exe 28 PID 1676 wrote to memory of 2040 1676 regsvr32.exe 28 PID 1676 wrote to memory of 2040 1676 regsvr32.exe 28 PID 1676 wrote to memory of 2040 1676 regsvr32.exe 28 PID 1676 wrote to memory of 2040 1676 regsvr32.exe 28 PID 1676 wrote to memory of 2040 1676 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\41c22d3cc889203fbf7b1693914de3fb.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\41c22d3cc889203fbf7b1693914de3fb.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2040
-