Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2024, 12:02

General

  • Target

    5b30ec492e8e46df703e8320533e4059.dll

  • Size

    212KB

  • MD5

    5b30ec492e8e46df703e8320533e4059

  • SHA1

    2957e8fd1993a84867912e271cc25271993af82b

  • SHA256

    053a92295bb64f66565794c6c977f6f0a61977a55985863c3a75a841a296a112

  • SHA512

    1ae8b8b840a0fe39aef875c36bf68ab51ce61754199bb7802cbe1e617f8b14e46955cdce7c7f7bff61bdf42ae12f7a2557de81f1fc31ebbe3f745af3be2fe8e0

  • SSDEEP

    3072:BtTk/szI//RTqHLteeNIzblvtui1zPy03OBh3HqbK9xxzhP:HY/szCErdN69tuk1+Bh3HqbKZzt

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\SysWOW64\regsvr32.exe
    /s C:\Users\Admin\AppData\Local\Temp\5b30ec492e8e46df703e8320533e4059.dll
    1⤵
    • Installs/modifies Browser Helper Object
    • Modifies registry class
    PID:2036
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\5b30ec492e8e46df703e8320533e4059.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-0-0x0000000010000000-0x0000000010036000-memory.dmp

    Filesize

    216KB