Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 16:59
Behavioral task
behavioral1
Sample
4bfa2e1c6ab5764170ca87d369a7d8b8.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
4bfa2e1c6ab5764170ca87d369a7d8b8.dll
-
Size
93KB
-
MD5
4bfa2e1c6ab5764170ca87d369a7d8b8
-
SHA1
63bcd877aba6fdd91b8cd5815aea5856b359c246
-
SHA256
c83bfc375e9ba32819d54615783d1b9873b3ef46da21db7b1d93a53174fb916d
-
SHA512
6e94ada02567c246cd52dbcdba078ba48229c64d7a76a6a58acd1341e30c47a8efd6cb750ab5b2e1dcecc220179881a71760a5f10c8e86cb2f121e0944403954
-
SSDEEP
1536:VL5YhFx/PolezJDcBP016Yxb/Skux2CNaT+UWZoH8KBjaK+6r9L22:3YJPo8iBPQbM2CMTlz2NX2
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2032-0-0x00000000004C0000-0x0000000000501000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0818987E-0A1C-4112-A6A1-3A39F2846FA7} regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0818987E-0A1C-4112-A6A1-3A39F2846FA7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0818987E-0A1C-4112-A6A1-3A39F2846FA7}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4bfa2e1c6ab5764170ca87d369a7d8b8.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0818987E-0A1C-4112-A6A1-3A39F2846FA7}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0818987E-0A1C-4112-A6A1-3A39F2846FA7}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2032 2252 regsvr32.exe 16 PID 2252 wrote to memory of 2032 2252 regsvr32.exe 16 PID 2252 wrote to memory of 2032 2252 regsvr32.exe 16 PID 2252 wrote to memory of 2032 2252 regsvr32.exe 16 PID 2252 wrote to memory of 2032 2252 regsvr32.exe 16 PID 2252 wrote to memory of 2032 2252 regsvr32.exe 16 PID 2252 wrote to memory of 2032 2252 regsvr32.exe 16
Processes
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\4bfa2e1c6ab5764170ca87d369a7d8b8.dll1⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2032
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4bfa2e1c6ab5764170ca87d369a7d8b8.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2252