Analysis

  • max time kernel
    121s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-11-2020 10:28

General

  • Target

    Dori.ocx.dll

  • Size

    141KB

  • MD5

    745868c40e6f1d1d40ae60335417f6d7

  • SHA1

    cfe42b4014fc22596b4305271c4a133492603349

  • SHA256

    7a5e4fd35a1a636ef1beb7e62cc647d7e63f5c7aadd2aa1a49d49c81183aca93

  • SHA512

    fae585aa131dfa0c5063991fe13938f73c83d78b43ee142ca39e767ec7db6ec7bb419522b4c0c6c210163b05e95db896388446dd8b70b7a29d4c6fe31d130b18

Score
8/10

Malware Config

Signatures

  • Blacklisted process makes network request 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 68 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SetWindowsHookEx 48 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2968
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll,#1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:648
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll,#1
          3⤵
          • Blacklisted process makes network request
          PID:3952
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:508
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3880
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1980
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uogsmkl2\uogsmkl2.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3716
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAD0A.tmp" "c:\Users\Admin\AppData\Local\Temp\uogsmkl2\CSC75B632ABD1F94F1AA5E3636A6A96A5D.TMP"
                  7⤵
                    PID:1484
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jcqvhdjm\jcqvhdjm.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2476
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAEBF.tmp" "c:\Users\Admin\AppData\Local\Temp\jcqvhdjm\CSCB1B29390F5284A47889976A4302CDA2D.TMP"
                    7⤵
                      PID:3172
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C timeout /t 5 && del "C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll"
            2⤵
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1328
            • C:\Windows\system32\timeout.exe
              timeout /t 5
              3⤵
              • Delays execution with timeout.exe
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              PID:3596
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:188
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:188 CREDAT:82945 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2920
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2072
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:82945 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1852
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:82948 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2980

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
          MD5

          a69fba04d9b13e82fb772d1b38b6054a

          SHA1

          f7ab8c1d32ddc58e13f65f9b8bb0cc844f164454

          SHA256

          733d04f9d9e1fdf85914f097cca3f8bfb3926c38a7ccf69e7c74d887abbc64ff

          SHA512

          6fae50c73cc08c48d5ecb6814785f82c46ded1dc00ba9a8b02a9b2bd907a10bba6015e0a5753487a12765db242162ce4f822bf5d3381a71ae2143c9f5d34669a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
          MD5

          6302e9a5d0f268f1433591d31e01acad

          SHA1

          24875c60b2590c988b31bf0e094fb1dc164d65f7

          SHA256

          72f928d53601ec4aba8671a028cec4007a86041bf7f8c89293da5bc2bcc0c411

          SHA512

          17ca30f8c78143e816829c7a11a44639e7c8321aefe5985001aabb8fef9e1b5a0dcefad9d1950a4e57190b5e170b492731e66e4df8449e9b2f2ea3bf0c3a3ba7

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-314712940\msapplication.xml
          MD5

          c7e58141bd5ecf62a0f487b36a8b0e37

          SHA1

          fca58ce5d0c7c454970048cc3d3c35b80bfd8df5

          SHA256

          8799ecd016534f9d59f64366359e3092b3aa9d8ac8dfd92ea803ebc79735ccab

          SHA512

          2720a3176ab9d6d06136fff540d3d11ef930303f670410775554ff1216766ccbf46837ef544bc0626f551f80df78cb6aae6efdf2a5bd991127b364c04a873421

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ygi6rqc\imagestore.dat
          MD5

          04df80bf324fc57bd174cc406201e1e2

          SHA1

          abb107e49242617f1aa225e766516dd672c1e308

          SHA256

          3e0cdaf4d6346210124a718b71882003f72fe89da946a37a31b5332e698d9187

          SHA512

          8be07abafb1364633139c09b8e37c6638cac10e7549ec57af8ed61f7734eb3dca6ab4f44205ceac6140050143405cc32dd5f591787728dcc06d64357172e7125

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RW8YYLAG\favicon[1].ico
          MD5

          a976d227e5d1dcf62f5f7e623211dd1b

          SHA1

          a2a9dc1abdd3d888484678663928cb024c359ee6

          SHA256

          66332859bd8e3441a019e073a318b62a47014ba244121301034b510dc7532271

          SHA512

          6754d545f2ce095cfa1fa7ca9e3223f89e37726ee7e541ebcf3e209e18b2602f3be8677598cb30d697327a63de032c11dbf8ef7ad7889a79c488a21044c1cb3f

        • C:\Users\Admin\AppData\Local\Temp\RESAD0A.tmp
          MD5

          a0180bcf5d64704b69f5750264c5f3fe

          SHA1

          2e44aab9685103f8b4704ba0fa8dc87188367e57

          SHA256

          65ecf338904ce04bb25a79bfb1f97e123997b86aca9ab8fed74ffcb86f2b1b9f

          SHA512

          e4c243d20e7c571288185d22901910561649eb74f1456d138a2530b4166086ef2f5fc00a2a4e1c776b4e97ad91f981dcaf753231636c7a2836c0b1648ee9a5b5

        • C:\Users\Admin\AppData\Local\Temp\RESAEBF.tmp
          MD5

          9cee2ab0351ffccdcb29e57a3d5db0ea

          SHA1

          2ba3a1440e820316a32bee9e35e6e57844d24906

          SHA256

          055c17589322c921c1621e3dd1b846cd4f867bfcf821f5d2ec6dea4af290e9de

          SHA512

          eb5f5d0cfdd70c026f9081e5c2151e652b83cb4b0484d568c65c99ac1133e3a0dcad45c3e01943ff8945e0b335d2191585c813bee4a089ae32a55ee538c637de

        • C:\Users\Admin\AppData\Local\Temp\jcqvhdjm\jcqvhdjm.dll
          MD5

          1079ada75b69e161ea545341cd8a762b

          SHA1

          735465040c2ea85336d9f6e74c2477af4371a96d

          SHA256

          236892c404baf7d68b9881d216449a240edd1e1cbb12ffe347f11af92256f5f2

          SHA512

          68a09044ab5db976a53d019f6ef50c47b49c5843bee5d91c9bdd6f2c5171c2ce0d08d03aeef0d64b0ad2e70fefbd6240db685c9bbc7ee805cec801832fbb2043

        • C:\Users\Admin\AppData\Local\Temp\uogsmkl2\uogsmkl2.dll
          MD5

          11a58d795c38d0d54e85da11c557a703

          SHA1

          e77a1c38080d249c21ab16710b67ebf114f75dff

          SHA256

          b007e4183bd044a9c5fd6f1db9ed2675b005ba86e14e2ea10618e2305b5199bc

          SHA512

          c8f0b24c8eadf098ed588db572a91bb879475304743eb234c6895d910a966b97ef9f484e207f6fe53ce1bd60efe9d98a14f909d92640073573254dd95bcd2602

        • \??\c:\Users\Admin\AppData\Local\Temp\jcqvhdjm\CSCB1B29390F5284A47889976A4302CDA2D.TMP
          MD5

          7918a6f8b461abd032097b9b515cc193

          SHA1

          e78c6eb1ae60f213173c8fc646a06f47336712bc

          SHA256

          a5d1aaa9990b387e35fa46100e3c4d307068e3e9ce9a8b48fec0fe680e50dc25

          SHA512

          931111aa34ad30be60e7bfcde8bee1d6c05fd357e4db52f60baad335214946a769bb587e3f3cd783cda5abfe2ae229f2af7e18d059a511129908a5096d3703f8

        • \??\c:\Users\Admin\AppData\Local\Temp\jcqvhdjm\jcqvhdjm.0.cs
          MD5

          a5043957e07dbe0dee7bb8aad13a403e

          SHA1

          571c9136e0e90d016dd83b24c40eadbf7186c701

          SHA256

          73775570d08cc971668d853274b7c9a0cfb407cf76480747b9e38542e5dc53c9

          SHA512

          14f98e4902059980ed8f46c72fdefeb404f14df0fa06628476d63f9bb9ed76fd6398abd4de8c1de7dfa2a8b2108c31e2b9b668acfc92958c1eecc4a0c8d656a1

        • \??\c:\Users\Admin\AppData\Local\Temp\jcqvhdjm\jcqvhdjm.cmdline
          MD5

          30ef885e63ef5d36ddb9111288daf35c

          SHA1

          dffedc99c46cbc2d3cfec3d9f3750d6eb4611bab

          SHA256

          c401c1370cdc883954adcfb53289518a6ca37d634841353545166ba74dfddae8

          SHA512

          30b98c97a5cc3309a08568e106397b8f7891e4eae7a167d02fab8fad065fa21ccb83ba95cf40d055beb163c64cda284e84e14d6e9968879a300f082587c66aab

        • \??\c:\Users\Admin\AppData\Local\Temp\uogsmkl2\CSC75B632ABD1F94F1AA5E3636A6A96A5D.TMP
          MD5

          8c287a8ff814282d2269c78729edde72

          SHA1

          10dba1d253850bcfaaf3bc140cc7e53e89210b90

          SHA256

          ee22a88e7d6825c38f25d17a02c2c5261fb1e96624f6ff52f87306d31d60e83f

          SHA512

          e4ce1f9fde13bd62ce3cf4468c7c24dea84c2602e0e53b4e81e9fe16c249517f6bc87f0d920a6a15fafb29f4ebfe7b6f8d9734a5b4e3f6e55a8f0afc8cf04abe

        • \??\c:\Users\Admin\AppData\Local\Temp\uogsmkl2\uogsmkl2.0.cs
          MD5

          aee5ecef6b6a9b4372991443276b71ce

          SHA1

          911bd26fba4c5e51423f2c6339cc267f8697f339

          SHA256

          90e03a7c9cb196fd260c54663a4c867f33621ac29746cd8c0a4b2aa9b390754a

          SHA512

          cf99d4941aa5d1a4dd3abd5ca7a4d3d19a7f497c3247fd09505e263a9a4646b81eb19d7a9312b17a00d22ca9881b6d725b76013b7dc470dcc964b77970c96cc3

        • \??\c:\Users\Admin\AppData\Local\Temp\uogsmkl2\uogsmkl2.cmdline
          MD5

          2296727600df583a99edf48ff211e702

          SHA1

          a9f477cfdad021a1e34f762e6edae40ea0feb689

          SHA256

          9f4e21d7b97d2a4773f9ef1d439ba8735f2c640c378d62a5c12b73e819bb27e2

          SHA512

          6b808ab48dced612742d05fd0c2f27f63db658dbfaf60413bf8a995a2e8e2bf00099d22b306f879f01c2261aebed6b3af91eea898d7f2ba30d648150a3a2ac72

        • memory/508-10-0x0000000000000000-mapping.dmp
        • memory/508-11-0x0000000000000000-mapping.dmp
        • memory/1328-35-0x000001B72B7D0000-0x000001B72B7E8000-memory.dmp
          Filesize

          96KB

        • memory/1484-20-0x0000000000000000-mapping.dmp
        • memory/1852-5-0x0000000000000000-mapping.dmp
        • memory/1980-16-0x00000201E2570000-0x00000201E2571000-memory.dmp
          Filesize

          4KB

        • memory/1980-34-0x00000201E2540000-0x00000201E2558000-memory.dmp
          Filesize

          96KB

        • memory/1980-14-0x00007FF99E710000-0x00007FF99F0FC000-memory.dmp
          Filesize

          9.9MB

        • memory/1980-13-0x0000000000000000-mapping.dmp
        • memory/1980-32-0x00000201E2500000-0x00000201E2501000-memory.dmp
          Filesize

          4KB

        • memory/1980-24-0x00000201E24F0000-0x00000201E24F1000-memory.dmp
          Filesize

          4KB

        • memory/1980-15-0x00000201C7E30000-0x00000201C7E31000-memory.dmp
          Filesize

          4KB

        • memory/2476-25-0x0000000000000000-mapping.dmp
        • memory/2920-2-0x0000000000000000-mapping.dmp
        • memory/2980-9-0x0000000000000000-mapping.dmp
        • memory/3172-28-0x0000000000000000-mapping.dmp
        • memory/3596-36-0x0000000000000000-mapping.dmp
        • memory/3716-17-0x0000000000000000-mapping.dmp
        • memory/3880-12-0x0000000000000000-mapping.dmp
        • memory/3952-1-0x0000000003100000-0x0000000003112000-memory.dmp
          Filesize

          72KB

        • memory/3952-0-0x0000000000000000-mapping.dmp