Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 09:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5329911f706434b57d58429469897164.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
5329911f706434b57d58429469897164.dll
-
Size
635KB
-
MD5
5329911f706434b57d58429469897164
-
SHA1
b42c30b3d0a48d0244aae03688ead71faeb881cf
-
SHA256
0bcf0f70229ccc0343e2a891e7c4626e25877309260260b64a6167bf1846a49a
-
SHA512
27fad142868c8dcc2b1924464c45b810030a28f6274cebdd1856c281bb4f88f22cd036e73ff67d97e5c0d09d5cfcee7cb0230f2db51656fbddb9cfcb3b6f39e4
-
SSDEEP
12288:YM0t9FNcxDMmfrLAF8rZIRf2MmsXatHbLBwL9Ohw/fO79s:ItjNcXnVInvaN/Bw8hI
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-7874-3954-44BA-21B68C43168B} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7874-3954-44BA-21B68C43168B}\ = "axc" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7874-3954-44BA-21B68C43168B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5329911f706434b57d58429469897164.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\5329911f706434b57d58429469897164.axc regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\5329911f706434b57d58429469897164.axc\ = "axc" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7874-3954-44BA-21B68C43168B}\ProgID\ = "5329911f706434b57d58429469897164.axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7874-3954-44BA-21B68C43168B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7874-3954-44BA-21B68C43168B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\5329911f706434b57d58429469897164.axc\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\5329911f706434b57d58429469897164.axc\Clsid\ = "{CC01FC6C-7874-3954-44BA-21B68C43168B}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7874-3954-44BA-21B68C43168B}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-7874-3954-44BA-21B68C43168B}\InprocServer32 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1364 wrote to memory of 5080 1364 regsvr32.exe 90 PID 1364 wrote to memory of 5080 1364 regsvr32.exe 90 PID 1364 wrote to memory of 5080 1364 regsvr32.exe 90
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5329911f706434b57d58429469897164.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5329911f706434b57d58429469897164.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:5080
-