Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 14:20
Behavioral task
behavioral1
Sample
20bf7a3ac4969f87c387f59cb34b3750N.dll
Resource
win7-20240704-en
General
-
Target
20bf7a3ac4969f87c387f59cb34b3750N.dll
-
Size
1.8MB
-
MD5
20bf7a3ac4969f87c387f59cb34b3750
-
SHA1
a8534bf47c2133effa3e9b25ce6334a1e8bc2ad9
-
SHA256
93a070992e937aa9cc17da55c1c20b40924eb2385c83ecc746960cbf89ee270a
-
SHA512
bb69a838a58704881c3cc792674fce2a968c9fc4174f4bfd2e2aa1339fe53f375e6aec63d386a1e2bcf8073d6693636d506cc22fadeb726b3fe09bcffa37b87d
-
SSDEEP
24576:OhGGliI5h/kWpflTr3nllyex2Hn0DoY/EX7z3XDMWTLlY+c7afN4NAQ8vf1:AbvppflTbvyex2UDoaE3TpTpY+xc8vf
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
resource yara_rule behavioral2/memory/1880-0-0x0000000000400000-0x000000000071C000-memory.dmp upx behavioral2/memory/1880-8-0x0000000000400000-0x000000000071C000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\NoExplorer = "1" regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT\iexplore.exe = "1" regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F577DD6-A889-B773-13C5-1FBA13C51FBA}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F577DD6-A889-B773-13C5-1FBA13C51FBA}\ = "WebCheckWebCrawler" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F577DD6-A889-B773-13C5-1FBA13C51FBA}\InProcServer32\ = "C:\\Windows\\SysWOW64\\webcheck.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\20bf7a3ac4969f87c387f59cb34b3750N.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF39202E-BE00-4DB0-9E87-9D38AF793FCD}\ = "Ssystem Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F577DD6-A889-B773-13C5-1FBA13C51FBA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F577DD6-A889-B773-13C5-1FBA13C51FBA}\InProcServer32 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1880 regsvr32.exe Token: SeIncBasePriorityPrivilege 1880 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4876 wrote to memory of 1880 4876 regsvr32.exe 84 PID 4876 wrote to memory of 1880 4876 regsvr32.exe 84 PID 4876 wrote to memory of 1880 4876 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\20bf7a3ac4969f87c387f59cb34b3750N.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\20bf7a3ac4969f87c387f59cb34b3750N.dll2⤵
- Checks BIOS information in registry
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1880
-