Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 08:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c823753680c2429102be778a03d64058.dll
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
c823753680c2429102be778a03d64058.dll
-
Size
355KB
-
MD5
c823753680c2429102be778a03d64058
-
SHA1
9c1bd27324ad791b24e75b620c4f89aeea95074b
-
SHA256
4ca4cc64822f6f4be89dd7d72f1556482082f6cb334fc06c5a344232c83b2606
-
SHA512
db1b713a19c6717954cca7f32b898e326ed0ea9034b5333c3be1a640969775e2418d3c92c8d757631daac837faea26161ed79c4a869e04eda78b2ecc63d60546
-
SSDEEP
6144:CEXiv0zUL3I2umR2f5sbUfTTLSiYErRhz57/TTBkkgtGL5ZwkEbXT06j:tQ0qIO2fKeSerRhl/TT+kgtGN1Ed
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4924d0d5-12e9-36a2-6ae4-d448a939ebe8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4924d0d5-12e9-36a2-6ae4-d448a939ebe8}\NoExplorer = "\"\"" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4924d0d5-12e9-36a2-6ae4-d448a939ebe8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4924d0d5-12e9-36a2-6ae4-d448a939ebe8}\ = "adssite" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4924d0d5-12e9-36a2-6ae4-d448a939ebe8}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4924d0d5-12e9-36a2-6ae4-d448a939ebe8}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c823753680c2429102be778a03d64058.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4924d0d5-12e9-36a2-6ae4-d448a939ebe8}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3752 wrote to memory of 4892 3752 regsvr32.exe 88 PID 3752 wrote to memory of 4892 3752 regsvr32.exe 88 PID 3752 wrote to memory of 4892 3752 regsvr32.exe 88
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c823753680c2429102be778a03d64058.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c823753680c2429102be778a03d64058.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:4892
-