Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 02:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5253bb70fe92ce56af12e774b36945b4.dll
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
5253bb70fe92ce56af12e774b36945b4.dll
-
Size
640KB
-
MD5
5253bb70fe92ce56af12e774b36945b4
-
SHA1
60cfd21a9103943bf234e27e2d452efdc9a4796f
-
SHA256
e4442dd1b02fd3806763e7d46845b9007135fccde143f08737fc246a70f655e0
-
SHA512
d50b52e4a923fe982f2c64ff1f4d2f046ecfd72ae9553ee0dbd62aaf94ca303574e477ad8e2594807d9901db305eef58e8c69307a2cea90d77963100a197c063
-
SSDEEP
12288:e0Et9YDc5DMWfT44XUDxoyiD02sHL1ACxB/XGh+a2tePm:OtWDc/EXouPL1ACxB/2h+aA+
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-CB44-319F-C5D4-6BD772685786} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-CB44-319F-C5D4-6BD772685786}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5253bb70fe92ce56af12e774b36945b4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-CB44-319F-C5D4-6BD772685786}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\5253bb70fe92ce56af12e774b36945b4.brm inc regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\5253bb70fe92ce56af12e774b36945b4.brm inc\Clsid\ = "{CC01FC6C-CB44-319F-C5D4-6BD772685786}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-CB44-319F-C5D4-6BD772685786}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-CB44-319F-C5D4-6BD772685786}\ = "brm inc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-CB44-319F-C5D4-6BD772685786}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\5253bb70fe92ce56af12e774b36945b4.brm inc\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-CB44-319F-C5D4-6BD772685786}\ProgID\ = "5253bb70fe92ce56af12e774b36945b4.brm inc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-CB44-319F-C5D4-6BD772685786} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\5253bb70fe92ce56af12e774b36945b4.brm inc\ = "brm inc" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2140 2060 regsvr32.exe 28 PID 2060 wrote to memory of 2140 2060 regsvr32.exe 28 PID 2060 wrote to memory of 2140 2060 regsvr32.exe 28 PID 2060 wrote to memory of 2140 2060 regsvr32.exe 28 PID 2060 wrote to memory of 2140 2060 regsvr32.exe 28 PID 2060 wrote to memory of 2140 2060 regsvr32.exe 28 PID 2060 wrote to memory of 2140 2060 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5253bb70fe92ce56af12e774b36945b4.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5253bb70fe92ce56af12e774b36945b4.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2140
-