Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-02-2024 16:41

General

  • Target

    a4461a8584809c3edf31d68db306e14e.dll

  • Size

    611KB

  • MD5

    a4461a8584809c3edf31d68db306e14e

  • SHA1

    a4cd8d8ca29a6b6f93c657323b7f08fe1bff8886

  • SHA256

    005f60757ea4dba625c6ce2d1bafaa61ccb927dfa26f518942d25f209e710cec

  • SHA512

    581b169a4aa46fe9e8e94b71ec74d66019a85d00154792cca32b271b48c7dc31504b62aa4a8b683bb9cd98ce8d5bd895c017257cc6b1a0c36a8b713757fcad7e

  • SSDEEP

    12288:dyA1ZdqVfv/6HftOIA3+00wstpSdCi3TLdrviFA5rgj0VBwYHeIBv7pj:t1fqZCHwIr00taCiHR6+rG0beIBT

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a4461a8584809c3edf31d68db306e14e.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\a4461a8584809c3edf31d68db306e14e.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2200-0-0x00000000003E0000-0x000000000047E000-memory.dmp

    Filesize

    632KB