Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 10:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c868b0383ce552a03273e2c6c06499c8.dll
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
c868b0383ce552a03273e2c6c06499c8.dll
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c868b0383ce552a03273e2c6c06499c8.dll
-
Size
159KB
-
MD5
c868b0383ce552a03273e2c6c06499c8
-
SHA1
1832561eaa1f88e3bc4af3ae6ebf6dd17ab4f0b0
-
SHA256
1726f6dfd07a97a658155abd6974ae16bc8c0cf71eeee4b669fd3f5db0de03d2
-
SHA512
a420d6d87cdbd7979a73003dddd2d0a6dce305b27c6a0d1d6aa49324a7ae6e23575656101d7887ab55ed099b2ef4b3b07a233fa3217b885c43d21427fbebcddc
-
SSDEEP
3072:HJuzhDjwnoqo6rKiF8rZt3IGQ5Bl+kyq5lGBMy4v5c:HJuzhDjUK88rHfQ5sq5UcG
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\{4fe4d904-172a-2c25-797c-0886dd7e2c7c} = "C:\\Windows\\System32\\Rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\c868b0383ce552a03273e2c6c06499c8.dll\" DllStub" regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f5fd6c00-5c3e-58d2-f065-180bbf98674c} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{f5fd6c00-5c3e-58d2-f065-180bbf98674c}\NoExplorer = "\"\"" regsvr32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f5fd6c00-5c3e-58d2-f065-180bbf98674c} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f5fd6c00-5c3e-58d2-f065-180bbf98674c}\ = "giantads browser enhancer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f5fd6c00-5c3e-58d2-f065-180bbf98674c}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f5fd6c00-5c3e-58d2-f065-180bbf98674c}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c868b0383ce552a03273e2c6c06499c8.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{f5fd6c00-5c3e-58d2-f065-180bbf98674c}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2216 2152 regsvr32.exe 28 PID 2152 wrote to memory of 2216 2152 regsvr32.exe 28 PID 2152 wrote to memory of 2216 2152 regsvr32.exe 28 PID 2152 wrote to memory of 2216 2152 regsvr32.exe 28 PID 2152 wrote to memory of 2216 2152 regsvr32.exe 28 PID 2152 wrote to memory of 2216 2152 regsvr32.exe 28 PID 2152 wrote to memory of 2216 2152 regsvr32.exe 28
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c868b0383ce552a03273e2c6c06499c8.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c868b0383ce552a03273e2c6c06499c8.dll2⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2216
-