Analysis
-
max time kernel
157s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 20:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b59cf0aca2bbbe5139fbba10ad47d212.dll
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
b59cf0aca2bbbe5139fbba10ad47d212.dll
-
Size
561KB
-
MD5
b59cf0aca2bbbe5139fbba10ad47d212
-
SHA1
1baca469402d5af0dd3e89fd0d39f98352e54424
-
SHA256
e265b54887822c303476a4e4a0fa4ea831e63f64a2d3766cf45de7004b010df1
-
SHA512
9032675ec49ee3bdf13ab3b6d2345501e32cac9ef1b1fb737ac0484133ebef7c46d2d40462016cf5d45ebf14ea46cd9a57adbb37f53136a90eb1b45ea3009af0
-
SSDEEP
12288:sgUV94y09yxH1az44i2JiU5VVNIUOZH5by2d40PLF:gVGy0E04wskIZHME40PL
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-B5F7-5827-42B7-393941668CAC} regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-B5F7-5827-42B7-393941668CAC}\ = "ic" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-B5F7-5827-42B7-393941668CAC}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-B5F7-5827-42B7-393941668CAC}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\b59cf0aca2bbbe5139fbba10ad47d212.ic regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\b59cf0aca2bbbe5139fbba10ad47d212.ic\ = "ic" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\b59cf0aca2bbbe5139fbba10ad47d212.ic\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\b59cf0aca2bbbe5139fbba10ad47d212.ic\Clsid\ = "{CC01FC6C-B5F7-5827-42B7-393941668CAC}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-B5F7-5827-42B7-393941668CAC}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-B5F7-5827-42B7-393941668CAC} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-B5F7-5827-42B7-393941668CAC}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b59cf0aca2bbbe5139fbba10ad47d212.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CC01FC6C-B5F7-5827-42B7-393941668CAC}\ProgID\ = "b59cf0aca2bbbe5139fbba10ad47d212.ic" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4420 wrote to memory of 1216 4420 regsvr32.exe 94 PID 4420 wrote to memory of 1216 4420 regsvr32.exe 94 PID 4420 wrote to memory of 1216 4420 regsvr32.exe 94
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b59cf0aca2bbbe5139fbba10ad47d212.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b59cf0aca2bbbe5139fbba10ad47d212.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:81⤵PID:1788