Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 02:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ccee6bf79a1cf5de6be1c0a0cc5ea671.dll
Resource
win7-20240215-en
4 signatures
150 seconds
General
-
Target
ccee6bf79a1cf5de6be1c0a0cc5ea671.dll
-
Size
48KB
-
MD5
ccee6bf79a1cf5de6be1c0a0cc5ea671
-
SHA1
9a3b35c8342e0f6556a01b4cf0c2dba43f41bbda
-
SHA256
0fbe0c225b348b5f63181ce182417cdb4aeb8dd870a5ecf12ab33daf5ab05900
-
SHA512
f5a055391e7577fbe966ed399453e8411ac45d358e0c7962a6f467e8b2d6196a9011748fdfe666900dabc39a6450205bff428bf2cdddf9cd2ac22d4a68bb04ba
-
SSDEEP
768:B/F8Q3EC8sBJPLZngnFtA3/mOWLSt5bB2VqiVGOuHJu+pt+xnCDR:BtlIcJzmsmIt5ziVBuHtpwxnCD
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3C4B6AAC-67FB-49A9-B98E-5846910E769D} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{3C4B6AAC-67FB-49A9-B98E-5846910E769D}\NoExplorer = "1" regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBarLayout = 110000000000000000000000040000001f0000000000000001000000000000000000000005000000000400000000000002000000010000000000000004000000a100000000000000030000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 130000000000000000000000040000001f0000000000000001000000000000000000000005000000000400000000000002000000010000000000000004000000a100000000000000030000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shell regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shell\OpenHomePage regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3C4B6AAC-67FB-49A9-B98E-5846910E769D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3C4B6AAC-67FB-49A9-B98E-5846910E769D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ccee6bf79a1cf5de6be1c0a0cc5ea671.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shell\OpenHomePage\Command regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3C4B6AAC-67FB-49A9-B98E-5846910E769D} regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2920 2916 regsvr32.exe 28 PID 2916 wrote to memory of 2920 2916 regsvr32.exe 28 PID 2916 wrote to memory of 2920 2916 regsvr32.exe 28 PID 2916 wrote to memory of 2920 2916 regsvr32.exe 28 PID 2916 wrote to memory of 2920 2916 regsvr32.exe 28 PID 2916 wrote to memory of 2920 2916 regsvr32.exe 28 PID 2916 wrote to memory of 2920 2916 regsvr32.exe 28 PID 2920 wrote to memory of 2984 2920 regsvr32.exe 29 PID 2920 wrote to memory of 2984 2920 regsvr32.exe 29 PID 2920 wrote to memory of 2984 2920 regsvr32.exe 29 PID 2920 wrote to memory of 2984 2920 regsvr32.exe 29 PID 2920 wrote to memory of 2984 2920 regsvr32.exe 29 PID 2920 wrote to memory of 2984 2920 regsvr32.exe 29 PID 2920 wrote to memory of 2984 2920 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ccee6bf79a1cf5de6be1c0a0cc5ea671.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ccee6bf79a1cf5de6be1c0a0cc5ea671.dll2⤵
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe "C:\Users\Admin\AppData\Local\Temp\ccee6bf79a1cf5de6be1c0a0cc5ea671.dll",DllGetObjectType3⤵PID:2984
-
-