Analysis
-
max time kernel
156s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 15:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
53eb463a6d2c17b01c4242702c7218a6.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
53eb463a6d2c17b01c4242702c7218a6.dll
-
Size
50KB
-
MD5
53eb463a6d2c17b01c4242702c7218a6
-
SHA1
378a7fe3cfd5b8678dfcbcd106032472e6ea1433
-
SHA256
44dd2bcddbabd007519cfa2e0292d1a3a2c86746f95f8fd80cbb78af25360eb5
-
SHA512
e11d7d5a82daffb941505e637d663c01146c337e6210fe9a41367b2ecff2293ffc2308f8de2842d1f247d572a354ef66a809ae300f7ec63a765a85ff7a5c991a
-
SSDEEP
384:TxCCvdd0Qz9CkEgczgVZaXGZCfk28OoLgvRXYlXthsMLZfcVc96YuysOxnbwto:TxC69jCACsFOJlYdTkhYfxbG
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AC382B8B-C417-40AB-9F17-2F8BED8F859D} regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC382B8B-C417-40AB-9F17-2F8BED8F859D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC382B8B-C417-40AB-9F17-2F8BED8F859D}\ = "t" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC382B8B-C417-40AB-9F17-2F8BED8F859D}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC382B8B-C417-40AB-9F17-2F8BED8F859D}\InProcServer32\ = "C:\\Program Files\\Microsoft Synchronization Services\\edfii.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AC382B8B-C417-40AB-9F17-2F8BED8F859D}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1156 wrote to memory of 4368 1156 regsvr32.exe 90 PID 1156 wrote to memory of 4368 1156 regsvr32.exe 90 PID 1156 wrote to memory of 4368 1156 regsvr32.exe 90
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\53eb463a6d2c17b01c4242702c7218a6.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\53eb463a6d2c17b01c4242702c7218a6.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4368
-