Analysis

  • max time kernel
    94s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 10:33

General

  • Target

    $PROGRAMFILES/Baidu/AddressBar/AddressBar_Tmp/AddressBar.dll

  • Size

    510KB

  • MD5

    09279fab3646f9cce9a59b56042eb1d4

  • SHA1

    0c7b50c7ba7aad340eefad07f0e2550ea20af95e

  • SHA256

    ba4eff0e211de087aa56d1ea4acb429b1c7ec642451c16c7a54e2f1b453f3d9c

  • SHA512

    45f7f0c7daacecb210d7c6b73d96ec89cd992741b707634f145a3b930523437565f8d14faacaf4a1ccf45a81f7860d776c74ac6a2476e78ebadf9f137c37715a

  • SSDEEP

    12288:NkvfqN8YA/XWvDs6YRZpVGE2tYz0r/kq6ljj:NFDs6YRZpVGE2a4rP6ljj

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Baidu\AddressBar\AddressBar_Tmp\AddressBar.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\$PROGRAMFILES\Baidu\AddressBar\AddressBar_Tmp\AddressBar.dll
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Writes to the Master Boot Record (MBR)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Program Files (x86)\Baidu\AddressBar\ASBarBroker.exe
        "C:\Program Files (x86)\Baidu\AddressBar\ASBarBroker.exe" -RegServer
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Baidu\AddressBar\ASBarBroker.exe

    Filesize

    125KB

    MD5

    8dd475fb69bfebb99a8d1c922a05f41f

    SHA1

    f787d1a59a119166a6e1978d92a8498d338b469a

    SHA256

    df0f74728c622c03b267e7f4347ce8ee760484578433e16d95015af0a288c8c7

    SHA512

    efc69105dac4fe864e56bb8a5e5db3805c72fe16c11649035de7e52966e064e32496dc86727c1b008ce20fb0802e43007a3fd61aac3ab8ced79a5b5fd5ee36e4

  • C:\Program Files (x86)\Baidu\AddressBar\AddressBar.dll

    Filesize

    510KB

    MD5

    09279fab3646f9cce9a59b56042eb1d4

    SHA1

    0c7b50c7ba7aad340eefad07f0e2550ea20af95e

    SHA256

    ba4eff0e211de087aa56d1ea4acb429b1c7ec642451c16c7a54e2f1b453f3d9c

    SHA512

    45f7f0c7daacecb210d7c6b73d96ec89cd992741b707634f145a3b930523437565f8d14faacaf4a1ccf45a81f7860d776c74ac6a2476e78ebadf9f137c37715a

  • memory/2928-5-0x0000000002270000-0x00000000022F4000-memory.dmp

    Filesize

    528KB