Analysis

  • max time kernel
    124s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-12-2020 14:28

General

  • Target

    4785d3a3efa5e29793049412371587d5.exe

  • Size

    375KB

  • MD5

    4785d3a3efa5e29793049412371587d5

  • SHA1

    025e645ac5beab6195ac18dcf45730d60afa8bdb

  • SHA256

    7a01b6f6c639d80933c7f60dbde344a1a12f20088af192b74c13c28d2810aed3

  • SHA512

    497624a931bbbcb02bef78a78aded48b417fd09dc2ed3e5fbfcdd6cdc76a708e41c3a1c52b2883c7e8db9b03f00be72d3a8172787452cb9dcf8523699bc59d19

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Modifies registry class 186 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4785d3a3efa5e29793049412371587d5.exe
    "C:\Users\Admin\AppData\Local\Temp\4785d3a3efa5e29793049412371587d5.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:936
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:936 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1620

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2W37GNIV.txt
    MD5

    afa78891ec0e348435bc7a1537793dbb

    SHA1

    dc7c58b860ff42a79766685c969901ed91608e64

    SHA256

    03b883df38b5f8b3e91050c54befbdba00412f1a28e31769000367305921fcf5

    SHA512

    1f9fb96cf3c5e57b60268c93e3e89b35062cb3ac6f8681652cddaae0deccac7cf992a2775a683857442f99149de31a20a1ab48242167e63edc18d226470a7dc2

  • \Windows\SysWOW64\CBRun.bpl
    MD5

    45682678083ba2f948dd6517e1b5323b

    SHA1

    990c6cd98510d1d73d61bc652d2900894da0a319

    SHA256

    4a0d3d5680985b883446801a6e4b71d20abc643a5b8272a214defbf18843066c

    SHA512

    a81fb6ba09c0bec253d1c5580a27c188962293ef64a56f8ed08c7c1cf53da4579725b63266555768cc2a112688c0c46672dab33550675f9d9e9b7db7a357a92f

  • memory/936-9-0x0000000000000000-mapping.dmp
  • memory/1620-10-0x0000000000000000-mapping.dmp
  • memory/1652-3-0x000007FEF6460000-0x000007FEF66DA000-memory.dmp
    Filesize

    2.5MB

  • memory/1680-2-0x0000000000340000-0x0000000000388000-memory.dmp
    Filesize

    288KB

  • memory/1680-5-0x0000000000510000-0x0000000000520000-memory.dmp
    Filesize

    64KB

  • memory/1680-6-0x0000000003080000-0x000000000313A000-memory.dmp
    Filesize

    744KB

  • memory/1680-7-0x0000000001FE0000-0x0000000002001000-memory.dmp
    Filesize

    132KB

  • memory/1680-8-0x0000000004B60000-0x0000000004C1A000-memory.dmp
    Filesize

    744KB