Analysis

  • max time kernel
    138s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 04:53

General

  • Target

    4fa329b07243fe93389ee08e64a77452.dll

  • Size

    561KB

  • MD5

    4fa329b07243fe93389ee08e64a77452

  • SHA1

    325446009137704f8147c3b5bd82aefb0c6128fe

  • SHA256

    39a79d3349d3696fb416de50e1262189f920d8d81c578145c4cd3656163b6799

  • SHA512

    02316fff474d1e28f0b56ead35671162be3b2deaf95259e13739084817c2510b2d0f892df1066f60bfc95be3597bcffb847e32e12a0bb7b3240c5a733f3fc38d

  • SSDEEP

    12288:wgUV94y09yxH1az44i2JiU5VVNIUOZH5by2d9tZl:MVGy0E04wskIZHME9L

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\4fa329b07243fe93389ee08e64a77452.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\4fa329b07243fe93389ee08e64a77452.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads