Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7519dac13884847e84001ff025061a58.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
7519dac13884847e84001ff025061a58.dll
-
Size
608KB
-
MD5
7519dac13884847e84001ff025061a58
-
SHA1
ab285aa6e71c364831298f852b852112a5dc58fa
-
SHA256
16181c08c7e5c1e3a70006db4918544d42cb98e095140e4e949552f14659b6b7
-
SHA512
05046a914d7e45c100c47fe7eec6d0c3208bcb831694de94b96d0c6bacdd25be976fa0a42929f9050d6e7f99d297217779cea59bf068cb6018cb015abb8cac93
-
SSDEEP
12288:ApIt9HX65cspWkY5DARyLuaIg3Qao1rdnsnnY04/:AetFXsoB7LGnao1riY04
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-6686-2451-E98D-712E825DBD5F} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-6686-2451-E98D-712E825DBD5F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-6686-2451-E98D-712E825DBD5F}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7519dac13884847e84001ff025061a58.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\7519dac13884847e84001ff025061a58.iwc regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\7519dac13884847e84001ff025061a58.iwc\Clsid\ = "{CC01FC6C-6686-2451-E98D-712E825DBD5F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-6686-2451-E98D-712E825DBD5F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-6686-2451-E98D-712E825DBD5F}\ProgID\ = "7519dac13884847e84001ff025061a58.iwc" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-6686-2451-E98D-712E825DBD5F}\ = "iwc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-6686-2451-E98D-712E825DBD5F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-6686-2451-E98D-712E825DBD5F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\7519dac13884847e84001ff025061a58.iwc\ = "iwc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\7519dac13884847e84001ff025061a58.iwc\Clsid regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1724 1936 regsvr32.exe 90 PID 1936 wrote to memory of 1724 1936 regsvr32.exe 90 PID 1936 wrote to memory of 1724 1936 regsvr32.exe 90
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7519dac13884847e84001ff025061a58.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7519dac13884847e84001ff025061a58.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1724
-