Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 00:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
64091ff9d9021a857598ff11e4db8470.dll
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
64091ff9d9021a857598ff11e4db8470.dll
-
Size
19KB
-
MD5
64091ff9d9021a857598ff11e4db8470
-
SHA1
586e92c56d7b99e61502dc662062d8ddfb88367c
-
SHA256
4f3e90771e8fa912d9d5c7d6fd27cdb4e4b21703c8590c9e7d0795fb6ed1f615
-
SHA512
fd4d5145a47aa956e10f062a311787e44e61ecd935e40302fd289d27317cb37f1263d2c8e621a74b3a8a45c8ffec0033fd45cac16b81e1beb23113b718d28e87
-
SSDEEP
384:+Dgy323gQIhmX6AFmk3t19nMRsCW12SUlGElFEkpF1:+r323gnhmKUrvJMRbZS6lx71
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8A06A1A7-9E64-4359-8556-B6EA03D69814} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8A06A1A7-9E64-4359-8556-B6EA03D69814}\ regsvr32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A06A1A7-9E64-4359-8556-B6EA03D69814} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A06A1A7-9E64-4359-8556-B6EA03D69814}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A06A1A7-9E64-4359-8556-B6EA03D69814}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\64091ff9d9021a857598ff11e4db8470.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A06A1A7-9E64-4359-8556-B6EA03D69814}\InprocServer32\ThreadingModel = "Free" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2820 wrote to memory of 4484 2820 regsvr32.exe 86 PID 2820 wrote to memory of 4484 2820 regsvr32.exe 86 PID 2820 wrote to memory of 4484 2820 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\64091ff9d9021a857598ff11e4db8470.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\64091ff9d9021a857598ff11e4db8470.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4484
-