Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 12:40
Behavioral task
behavioral1
Sample
c5e6114bd035557469bf9da02f38ba43.dll
Resource
win7-20240215-en
General
-
Target
c5e6114bd035557469bf9da02f38ba43.dll
-
Size
424KB
-
MD5
c5e6114bd035557469bf9da02f38ba43
-
SHA1
8740f1b1a2bd6b4419e88df7cd2476085de5a2f2
-
SHA256
e98c2b46ff8f65feaaf66b031179616939237ed9009bca1adde0c9aa752a2f56
-
SHA512
95dc2ca8827acf6f5da7286dc22da8506fc8e537c6d1f71bc949ce7ab49e38273a15725a2d5ddaf9d6bba4dbae5bac796e490b8ea90e9c054db22381139d7ec2
-
SSDEEP
6144:Q16AUrfixlYlvy+EBHpHNhhI966AGkAjOpoaY7Lx7E/LN4fj4QxF9QhkECzLtbA:Q1ky+epxq6xGJOpqvxk4fUurHC
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0acf6538-9d27-a7cf-af5f-18986009c899} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0acf6538-9d27-a7cf-af5f-18986009c899}\NoExplorer = "\"\"" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0acf6538-9d27-a7cf-af5f-18986009c899} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0acf6538-9d27-a7cf-af5f-18986009c899}\ = "adssite" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0acf6538-9d27-a7cf-af5f-18986009c899}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0acf6538-9d27-a7cf-af5f-18986009c899}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c5e6114bd035557469bf9da02f38ba43.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0acf6538-9d27-a7cf-af5f-18986009c899}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2320 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3272 wrote to memory of 4680 3272 regsvr32.exe 87 PID 3272 wrote to memory of 4680 3272 regsvr32.exe 87 PID 3272 wrote to memory of 4680 3272 regsvr32.exe 87
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c5e6114bd035557469bf9da02f38ba43.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c5e6114bd035557469bf9da02f38ba43.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4680
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD573e3559d02ba8078c96e1089da1f5417
SHA120b5cccb8e193359928a058c745e1a7ddb4d21ac
SHA256605d5898f6ce56e6b0439de370fd7a785b1998e78f68ff84c5545aeb0c91d92d
SHA51230ec19c52bf19dcd938811c00db29bf5c9f867e9cb2dc1cd425483a44d775fee8b2f4bc43751b2d990efbda40f2554b296b98e843de6d4cb608bc7ef34bf9674