Analysis
-
max time kernel
138s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 04:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4fa329b07243fe93389ee08e64a77452.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
4fa329b07243fe93389ee08e64a77452.dll
-
Size
561KB
-
MD5
4fa329b07243fe93389ee08e64a77452
-
SHA1
325446009137704f8147c3b5bd82aefb0c6128fe
-
SHA256
39a79d3349d3696fb416de50e1262189f920d8d81c578145c4cd3656163b6799
-
SHA512
02316fff474d1e28f0b56ead35671162be3b2deaf95259e13739084817c2510b2d0f892df1066f60bfc95be3597bcffb847e32e12a0bb7b3240c5a733f3fc38d
-
SSDEEP
12288:wgUV94y09yxH1az44i2JiU5VVNIUOZH5by2d9tZl:MVGy0E04wskIZHME9L
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-9FF5-87AD-E648-A39C83CDC87D} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-9FF5-87AD-E648-A39C83CDC87D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4fa329b07243fe93389ee08e64a77452.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-9FF5-87AD-E648-A39C83CDC87D}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\4fa329b07243fe93389ee08e64a77452.ic regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\4fa329b07243fe93389ee08e64a77452.ic\ = "ic" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-9FF5-87AD-E648-A39C83CDC87D}\ProgID\ = "4fa329b07243fe93389ee08e64a77452.ic" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-9FF5-87AD-E648-A39C83CDC87D}\ = "ic" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-9FF5-87AD-E648-A39C83CDC87D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\4fa329b07243fe93389ee08e64a77452.ic\Clsid\ = "{CC01FC6C-9FF5-87AD-E648-A39C83CDC87D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-9FF5-87AD-E648-A39C83CDC87D}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-9FF5-87AD-E648-A39C83CDC87D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\4fa329b07243fe93389ee08e64a77452.ic\Clsid regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1884 wrote to memory of 324 1884 regsvr32.exe 90 PID 1884 wrote to memory of 324 1884 regsvr32.exe 90 PID 1884 wrote to memory of 324 1884 regsvr32.exe 90
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\4fa329b07243fe93389ee08e64a77452.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\4fa329b07243fe93389ee08e64a77452.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:324
-