Analysis

  • max time kernel
    156s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 01:21

General

  • Target

    c2193a0ba432c2827dba896b308809cf.dll

  • Size

    192KB

  • MD5

    c2193a0ba432c2827dba896b308809cf

  • SHA1

    a0022cf71daa96f2ed4a4ec41bf63f11853cdd49

  • SHA256

    521ebdd2c15fa93a29b8ee7288f7d5d2746d479d13052e126c753a4b10a595be

  • SHA512

    ec21365a3f626cda5a47c8efaa474653fa8edcfb188700cd864f1bcc1f268e9185303b526d66bbd074c6bb6d424554dde8ff4fc172af55c09a566bfad1dbbfba

  • SSDEEP

    3072:e+mrh42ya4kcFoWZHlWzzXGOJlBpPlPlUAVa0Th+7dUchB6p:2rh42xcTHlrMXRlP9+7dd

Malware Config

Signatures

  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\c2193a0ba432c2827dba896b308809cf.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\c2193a0ba432c2827dba896b308809cf.dll
      2⤵
      • Sets file execution options in registry
      • Installs/modifies Browser Helper Object
      • Drops file in System32 directory
      • Modifies registry class
      PID:924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads