Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2024 22:08

General

  • Target

    $_4741_/IERBar.dll

  • Size

    213KB

  • MD5

    9e166c73aa9816c4b6ac49229955e29a

  • SHA1

    d3df2afe4eed9ad0d2a3d2693158bf3d8595f5da

  • SHA256

    9ef8b102c57316cadba77864bbe183e084b7346a6f994c8a32c519247f21dd12

  • SHA512

    78b440da36b73830cbfa9988dba99836a65d48eff8ba4e203f5de563d3afe7a613546291ec91e83c3ac44700c9317eef7fcdfb41811a07c912c80e0609c25214

  • SSDEEP

    6144:077lHwhDMaw7RPBYmDzH0AIj6lIyWkLPkBvcEtdaY:0/RKX2P+mDzH0noIbkLt9Y

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$_4741_\IERBar.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$_4741_\IERBar.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:3352

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads