Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 02:20
Behavioral task
behavioral1
Sample
8b251727424463f77653a4847b45b5b9.dll
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
8b251727424463f77653a4847b45b5b9.dll
-
Size
8KB
-
MD5
8b251727424463f77653a4847b45b5b9
-
SHA1
14b2d4f6a3b8e2581fd49f438fa74ee9657a5c8e
-
SHA256
529d42831cf2151e33cce12a6a7b3464274fed0b16beb9d56885c6f65e6d0392
-
SHA512
ff4a6d7c6b45a56d76ec370c8bb72ccd59dfca3ffa7f49d4c236b48c59eed3487c6b312595ddd4832cab572c4e46ea39644b065de65eff34419687555b536c6e
-
SSDEEP
192:8pkAc3vCrrcP7ws4UDkyLBHt3+LCDv5gv0kz1:Ck7qr4Tl4anVY6
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0BD44AB1-76A7-4E05-92F4-4B065FE72BD6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{0BD44AB1-76A7-4E05-92F4-4B065FE72BD6}\ regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{0BD44AB1-76A7-4E05-92F4-4B065FE72BD6} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0BD44AB1-76A7-4E05-92F4-4B065FE72BD6}\www = "www" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{0BD44AB1-76A7-4E05-92F4-4B065FE72BD6}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0BD44AB1-76A7-4E05-92F4-4B065FE72BD6}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8b251727424463f77653a4847b45b5b9.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0BD44AB1-76A7-4E05-92F4-4B065FE72BD6}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2072 2208 regsvr32.exe 28 PID 2208 wrote to memory of 2072 2208 regsvr32.exe 28 PID 2208 wrote to memory of 2072 2208 regsvr32.exe 28 PID 2208 wrote to memory of 2072 2208 regsvr32.exe 28 PID 2208 wrote to memory of 2072 2208 regsvr32.exe 28 PID 2208 wrote to memory of 2072 2208 regsvr32.exe 28 PID 2208 wrote to memory of 2072 2208 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\8b251727424463f77653a4847b45b5b9.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\8b251727424463f77653a4847b45b5b9.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2072
-