Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 07:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5863f090b04c25870b83efd9a8f84920.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
5863f090b04c25870b83efd9a8f84920.dll
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
5863f090b04c25870b83efd9a8f84920.dll
-
Size
162KB
-
MD5
5863f090b04c25870b83efd9a8f84920
-
SHA1
dee30eba8e26dee19983a7917d7024355a050559
-
SHA256
70fa3313cececb8416f3b75cd8402c7b7da358ee0360de893af89c2b90bd41c3
-
SHA512
27648386dd6e001492627c75b788b120b7415707acfddc373f549c87757462dba420d29a3faf80aff0a9afcf8a4b3f9d0e14ac3a03aecdf7e710a89191268280
-
SSDEEP
3072:mWHTquflwjk4lfg+RI6zRdNj+p9QTeo8eoxwp4HdLoGyMv5X:rHGuflQk4xg+RjRjj+pZxxwW9UkB
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\{a90bda4b-8292-ae53-d7c4-29adbd45ff2c} = "C:\\Windows\\System32\\Rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\5863f090b04c25870b83efd9a8f84920.dll\" DllStub" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{62992f23-dcf6-1af0-da3f-4933cf1ba145} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{62992f23-dcf6-1af0-da3f-4933cf1ba145}\NoExplorer = "\"\"" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62992f23-dcf6-1af0-da3f-4933cf1ba145}\ = "agadoo browser enhancer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62992f23-dcf6-1af0-da3f-4933cf1ba145}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62992f23-dcf6-1af0-da3f-4933cf1ba145}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5863f090b04c25870b83efd9a8f84920.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62992f23-dcf6-1af0-da3f-4933cf1ba145}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62992f23-dcf6-1af0-da3f-4933cf1ba145} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4908 3484 regsvr32.exe 88 PID 3484 wrote to memory of 4908 3484 regsvr32.exe 88 PID 3484 wrote to memory of 4908 3484 regsvr32.exe 88
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5863f090b04c25870b83efd9a8f84920.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\5863f090b04c25870b83efd9a8f84920.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4908
-