Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 18:53
Behavioral task
behavioral1
Sample
ac9a482577010a4201bac118bafbc66b.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
ac9a482577010a4201bac118bafbc66b.dll
-
Size
63KB
-
MD5
ac9a482577010a4201bac118bafbc66b
-
SHA1
3faa19adcc8f9f3d561dd5d0a4ec3fc4dc21f931
-
SHA256
c04b665bd6d39f249d8b118f3b12611be711f72bfdd6b96e4ad899d75938330d
-
SHA512
0c93bd9cec8b2c02235088312513594efe96a2fa294f705cf19d5f7a45dacaf07f6d447f88d8ae59950b2e935069c3bb22a58c3f959fae4c98e0ecd448da99ca
-
SSDEEP
768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoLs:nJIMlt6RRdOm214/hVh4KhHnZ4
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4692-0-0x0000000010000000-0x000000001002B000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{938A8A03-A938-4019-B764-03FF8D167D79} rundll32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{938A8A03-A938-4019-B764-03FF8D167D79} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{938A8A03-A938-4019-B764-03FF8D167D79}\InprocServer32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{938A8A03-A938-4019-B764-03FF8D167D79}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ac9a482577010a4201bac118bafbc66b.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{938A8A03-A938-4019-B764-03FF8D167D79}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2480 wrote to memory of 4692 2480 rundll32.exe 75 PID 2480 wrote to memory of 4692 2480 rundll32.exe 75 PID 2480 wrote to memory of 4692 2480 rundll32.exe 75
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac9a482577010a4201bac118bafbc66b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac9a482577010a4201bac118bafbc66b.dll,#12⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4692
-