Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare-0108f1f306b06689b0b60600ace91a18.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare-0108f1f306b06689b0b60600ace91a18.dll
Resource
win10v2004-20231215-en
General
-
Target
VirusShare-0108f1f306b06689b0b60600ace91a18.dll
-
Size
39KB
-
MD5
0108f1f306b06689b0b60600ace91a18
-
SHA1
c0e8c3f0215612caa9f1cb912e77c294acc6600c
-
SHA256
80e2df590d1c70b51f74e359dfae5d20bfd65d7c47f1e1bf3641fa5981ed7a3b
-
SHA512
1a5f1170e36deedc6d06a5821900e01d1206fff31e2d4e1871c8feb40d871b65fe4b42343b3cab806677d5d110814d8deb918f0e676cbbcd6c712527cb4c2f13
-
SSDEEP
768:8nlPuP08ADWJB7SpBrRWTY07rTInw5rAV8PHSNPHB:8i0TWJBmPrR6Y07rqaZPyJ
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sp = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Temp\\se.dll,DllInstall" rundll32.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D4FAEE92-DB49-4891-BC5A-09BD9E221CDE} regsvr32.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "about:blank" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Use Custom Search URL = "1" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\New Windows regsvr32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Search Bar = "res://C:\\Users\\Admin\\AppData\\Local\\Temp\\se.dll/space.html" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\HOMEOldSP = "about:blank" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Bar = "res://C:\\Users\\Admin\\AppData\\Local\\Temp\\se.dll/space.html" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Search regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Search regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "no" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\New Windows regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\New Windows\PopupMgr = "no" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Use Search Asst = "no" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Use Custom Search URL = "1" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Search\SearchAssistant = "about:blank" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "about:blank" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Search\SearchAssistant = "about:blank" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\HOMEOldSP = "about:blank" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Use Search Asst = "no" regsvr32.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "about:blank" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "about:blank" regsvr32.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17628B2B-D418-4DFC-875A-CB48BB509145}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17628B2B-D418-4DFC-875A-CB48BB509145}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/plain regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4FAEE92-DB49-4891-BC5A-09BD9E221CDE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4FAEE92-DB49-4891-BC5A-09BD9E221CDE}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17628B2B-D418-4DFC-875A-CB48BB509145} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17628B2B-D418-4DFC-875A-CB48BB509145}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VirusShare-0108f1f306b06689b0b60600ace91a18.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/html regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/html\CLSID = "{17628B2B-D418-4DFC-875A-CB48BB509145}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Filter\text/plain\CLSID = "{17628B2B-D418-4DFC-875A-CB48BB509145}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4FAEE92-DB49-4891-BC5A-09BD9E221CDE}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D4FAEE92-DB49-4891-BC5A-09BD9E221CDE}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VirusShare-0108f1f306b06689b0b60600ace91a18.dll" regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1068 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1068 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1068 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1068 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1068 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1068 2336 regsvr32.exe 28 PID 2336 wrote to memory of 1068 2336 regsvr32.exe 28 PID 1068 wrote to memory of 1892 1068 regsvr32.exe 29 PID 1068 wrote to memory of 1892 1068 regsvr32.exe 29 PID 1068 wrote to memory of 1892 1068 regsvr32.exe 29 PID 1068 wrote to memory of 1892 1068 regsvr32.exe 29 PID 1068 wrote to memory of 1892 1068 regsvr32.exe 29 PID 1068 wrote to memory of 1892 1068 regsvr32.exe 29 PID 1068 wrote to memory of 1892 1068 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\VirusShare-0108f1f306b06689b0b60600ace91a18.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\VirusShare-0108f1f306b06689b0b60600ace91a18.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\se.dll,DllInstall3⤵
- Loads dropped DLL
- Adds Run key to start application
PID:1892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD527b7a22cbcc376a2c406c0f592e82d9f
SHA1bf219f26fbe16eb93fab9560813b8f4a7c980f1a
SHA25626aa0e25a7142e86924c15aaf9aa4b8cee65d1f7c750a985ea92678367a9723a
SHA5120babe3e2fafeb270e27e1cc9e69d59bad1a3463696f5deec28f898c6f0561e3f38881385036fd7ed118ce0fae9528bf4a6e23c0bb1b04311740e4eaebda0f219