Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 14:20
Behavioral task
behavioral1
Sample
20bf7a3ac4969f87c387f59cb34b3750N.dll
Resource
win7-20240704-en
General
-
Target
20bf7a3ac4969f87c387f59cb34b3750N.dll
-
Size
1.8MB
-
MD5
20bf7a3ac4969f87c387f59cb34b3750
-
SHA1
a8534bf47c2133effa3e9b25ce6334a1e8bc2ad9
-
SHA256
93a070992e937aa9cc17da55c1c20b40924eb2385c83ecc746960cbf89ee270a
-
SHA512
bb69a838a58704881c3cc792674fce2a968c9fc4174f4bfd2e2aa1339fe53f375e6aec63d386a1e2bcf8073d6693636d506cc22fadeb726b3fe09bcffa37b87d
-
SSDEEP
24576:OhGGliI5h/kWpflTr3nllyex2Hn0DoY/EX7z3XDMWTLlY+c7afN4NAQ8vf1:AbvppflTbvyex2UDoaE3TpTpY+xc8vf
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe -
resource yara_rule behavioral1/memory/2504-1-0x00000000022A0000-0x00000000025BC000-memory.dmp upx behavioral1/memory/2504-9-0x00000000022A0000-0x00000000025BC000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\NoExplorer = "1" regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT\iexplore.exe = "1" regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F577DD6-A889-B773-13C5-1FBA13C51FBA}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F577DD6-A889-B773-13C5-1FBA13C51FBA}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\OLKFSTUB.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\20bf7a3ac4969f87c387f59cb34b3750N.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\ = "Ssystem Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F577DD6-A889-B773-13C5-1FBA13C51FBA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F577DD6-A889-B773-13C5-1FBA13C51FBA}\ = "Outlook File Icon Extension" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F577DD6-A889-B773-13C5-1FBA13C51FBA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2504 regsvr32.exe Token: SeIncBasePriorityPrivilege 2504 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2504 2076 regsvr32.exe 30 PID 2076 wrote to memory of 2504 2076 regsvr32.exe 30 PID 2076 wrote to memory of 2504 2076 regsvr32.exe 30 PID 2076 wrote to memory of 2504 2076 regsvr32.exe 30 PID 2076 wrote to memory of 2504 2076 regsvr32.exe 30 PID 2076 wrote to memory of 2504 2076 regsvr32.exe 30 PID 2076 wrote to memory of 2504 2076 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\20bf7a3ac4969f87c387f59cb34b3750N.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\20bf7a3ac4969f87c387f59cb34b3750N.dll2⤵
- Checks BIOS information in registry
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2504
-