Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 20:53

General

  • Target

    bcc7bd371f6fa4f9bdf071d7615fc732.exe

  • Size

    192KB

  • MD5

    bcc7bd371f6fa4f9bdf071d7615fc732

  • SHA1

    64cd37e97b216b17df51d35543b4077a8da32096

  • SHA256

    874a281111a8791c865b7dd7df94261ca355f04b68fdcda6c95b0860697fd443

  • SHA512

    2a40a1a39e57d61a31c55787be6e39aa7b2395fb72fce09f92d33fd9abb397be2ad7d4096fece3eb5d15954541daf804adb64c2662d1efbfada0ed700e23ef6d

  • SSDEEP

    3072:RupaoCA9OCu2S/tjXhzlzzSoer4YsrRYR4Scj2UXE6f30u+0:ZEOCu2+VlnwMO47P0uN

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcc7bd371f6fa4f9bdf071d7615fc732.exe
    "C:\Users\Admin\AppData\Local\Temp\bcc7bd371f6fa4f9bdf071d7615fc732.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\ddm3dia.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:620
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\n3tpa1.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2712

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\ddm3dia.dll

          Filesize

          111KB

          MD5

          5e4d3973ecdd251d2ed012f07f9353ae

          SHA1

          441dd645ee395408f44299199a2962fcdfdf0dc6

          SHA256

          21b29efb19dfe7cec9b6ad78b10ce0b95f5f6ebacf4e3b16c6d2ed97f314681c

          SHA512

          b6806e70d3cccde5eb9321508bee5587f67cb80d8a173a2fed066ce524c9bd008b54d39ee29de324cfa173f1909537bf006462208c6b4e1720a6c371f791e0f0

        • C:\Windows\SysWOW64\n3tpa1.dll

          Filesize

          66KB

          MD5

          77b538424ad0fcc09aad76ced368c2d2

          SHA1

          f390e079695619d4b2e65e7df8800ec93a8b9ece

          SHA256

          023c46d41c8b03a838dd4ca0a5d43230c48054858b4b5d479b0f44599c591cac

          SHA512

          cacd9960cf979988b7f4f41b76683cb69ee30304b8ea318ea39d57a96b3f7566b40815b0a9b8f51d9eb434e3c85122946c70281bd23533748e92d48a6cb1e737