Analysis
-
max time kernel
91s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
67a34735e88f8e85c178e4ee6d9f7dd4.exe
Resource
win7-20231215-en
General
-
Target
67a34735e88f8e85c178e4ee6d9f7dd4.exe
-
Size
145KB
-
MD5
67a34735e88f8e85c178e4ee6d9f7dd4
-
SHA1
dca640d775b7306599b489e9920d43911eeee6c0
-
SHA256
bccb00918c6e8da3815d6e3606d7726dd6cc8c2efad39915dfbf6f4589f0d049
-
SHA512
37c81c1b8e91b816985dcfffb8dae6d717804f26bbcc12f18637bfe7e5fddbfa2a065536fa4e7db02bf22288d6b756066bbd9b45675396c535b4c0c4211793f4
-
SSDEEP
3072:yRD4IS40saXWqEM8EGZ3egYtjgMHHcYrmHVEZxlCQlNe8i:yl45XeEET0bHHcYNCQLe
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1524 67a34735e88f8e85c178e4ee6d9f7dd4.exe 1524 67a34735e88f8e85c178e4ee6d9f7dd4.exe -
resource yara_rule behavioral2/memory/1524-14-0x0000000002540000-0x0000000002580000-memory.dmp upx behavioral2/memory/1524-19-0x0000000002540000-0x0000000002580000-memory.dmp upx behavioral2/memory/1524-18-0x0000000002540000-0x0000000002580000-memory.dmp upx behavioral2/memory/1524-17-0x0000000002540000-0x0000000002580000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A7AD294C-8495-42A9-92EB-39D716063E5B} 67a34735e88f8e85c178e4ee6d9f7dd4.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main 67a34735e88f8e85c178e4ee6d9f7dd4.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\TabProcGrowth = "1" 67a34735e88f8e85c178e4ee6d9f7dd4.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 67a34735e88f8e85c178e4ee6d9f7dd4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A7AD294C-8495-42A9-92EB-39D716063E5B} 67a34735e88f8e85c178e4ee6d9f7dd4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A7AD294C-8495-42A9-92EB-39D716063E5B}\InprocServer32\ = "C:\\ProgramData\\dmxmlhelputil.dll" 67a34735e88f8e85c178e4ee6d9f7dd4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A7AD294C-8495-42A9-92EB-39D716063E5B}\InprocServer32\ThreadingModel = "apartment" 67a34735e88f8e85c178e4ee6d9f7dd4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A7AD294C-8495-42A9-92EB-39D716063E5B}\InprocServer32 67a34735e88f8e85c178e4ee6d9f7dd4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 67a34735e88f8e85c178e4ee6d9f7dd4.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD55361e55ae0a8a283c5874b8278693455
SHA16e8be2f46b7949a99d49f91e9f0fcdb7a96ddbcd
SHA256c120e69b75b1bc107692b5ce2e9930d7c37da5d019b20264bfb72b81d2354c54
SHA51227dc129910bc79db0e89cd3dfa095d3914b79e8ba80156d5ef85d15417569640b1079f3f415bf9c9a6ad503721176f07b05a88c37899c784769dde18d35c8791
-
Filesize
77KB
MD55620012213e24cf2f25ba0f852ce8cde
SHA169dd4b93b9e47ee808fec1d1415aebae2253533b
SHA256c946e5b37fad245359793b181cfdac8f97b8b898902ca2caa20aa5c130ea0045
SHA5126caa24c81f6be8a58321805835d90018c0e0eba93eb9995e644f5ba7d8d31f81eee9e3b987f06eebcbaefe0d4cf04f44d42c3fb7f5f3326eb129b65c9c218da0
-
Filesize
80KB
MD5f6544c42a3e3295fa19a963874565f71
SHA148e1395600c1853730f19362cca84b591e1b419c
SHA256709dc1923143f466b89e641a80d63c41b11f2750a4d11a1b1c01ea5f6747196f
SHA51284e5e04c272113943e0946b0cae824d6a9d809d1330cddbb1710c2028e0e10b5e5810ed0862be57a95aeeff4f666f4dc4009eb88e19ca8b5f9839ca92a33edbb