Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 07:08
Static task
static1
Behavioral task
behavioral1
Sample
a7ae8e4bc04a200c85ebd599977d5bace425481f69ed9e28983b7e4f5aa79bf3.dll
Resource
win7-20220414-en
General
-
Target
a7ae8e4bc04a200c85ebd599977d5bace425481f69ed9e28983b7e4f5aa79bf3.dll
-
Size
883KB
-
MD5
2b1ed27affd5b2c6413780abe2f60a6b
-
SHA1
b2cbcf2d41695c9a173a7feba16bb4166c0c560f
-
SHA256
a7ae8e4bc04a200c85ebd599977d5bace425481f69ed9e28983b7e4f5aa79bf3
-
SHA512
f80d7dbb53a307648ff95ff12bdaa06a37f7b1d5d472585768dee296129ffdd28a3da7ff2d747f4b7a9f5858f71a5c98f069de110ddbd1fc71a3ca9df1c7ff03
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
EhStorAuthn.execonsent.exeSystemPropertiesDataExecutionPrevention.exepid process 1720 EhStorAuthn.exe 1704 consent.exe 1708 SystemPropertiesDataExecutionPrevention.exe -
Loads dropped DLL 7 IoCs
Processes:
EhStorAuthn.execonsent.exeSystemPropertiesDataExecutionPrevention.exepid process 1196 1720 EhStorAuthn.exe 1196 1704 consent.exe 1196 1708 SystemPropertiesDataExecutionPrevention.exe 1196 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lwausnzctoco = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\YEBS\\consent.exe" -
Processes:
rundll32.exeEhStorAuthn.execonsent.exeSystemPropertiesDataExecutionPrevention.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA consent.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesDataExecutionPrevention.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeEhStorAuthn.exepid process 1824 rundll32.exe 1824 rundll32.exe 1824 rundll32.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1720 EhStorAuthn.exe 1720 EhStorAuthn.exe 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 1196 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1196 wrote to memory of 1928 1196 EhStorAuthn.exe PID 1196 wrote to memory of 1928 1196 EhStorAuthn.exe PID 1196 wrote to memory of 1928 1196 EhStorAuthn.exe PID 1196 wrote to memory of 1720 1196 EhStorAuthn.exe PID 1196 wrote to memory of 1720 1196 EhStorAuthn.exe PID 1196 wrote to memory of 1720 1196 EhStorAuthn.exe PID 1196 wrote to memory of 1732 1196 consent.exe PID 1196 wrote to memory of 1732 1196 consent.exe PID 1196 wrote to memory of 1732 1196 consent.exe PID 1196 wrote to memory of 1704 1196 consent.exe PID 1196 wrote to memory of 1704 1196 consent.exe PID 1196 wrote to memory of 1704 1196 consent.exe PID 1196 wrote to memory of 1684 1196 SystemPropertiesDataExecutionPrevention.exe PID 1196 wrote to memory of 1684 1196 SystemPropertiesDataExecutionPrevention.exe PID 1196 wrote to memory of 1684 1196 SystemPropertiesDataExecutionPrevention.exe PID 1196 wrote to memory of 1708 1196 SystemPropertiesDataExecutionPrevention.exe PID 1196 wrote to memory of 1708 1196 SystemPropertiesDataExecutionPrevention.exe PID 1196 wrote to memory of 1708 1196 SystemPropertiesDataExecutionPrevention.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7ae8e4bc04a200c85ebd599977d5bace425481f69ed9e28983b7e4f5aa79bf3.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\EhStorAuthn.exeC:\Windows\system32\EhStorAuthn.exe1⤵
-
C:\Users\Admin\AppData\Local\9JIjQEt\EhStorAuthn.exeC:\Users\Admin\AppData\Local\9JIjQEt\EhStorAuthn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵
-
C:\Users\Admin\AppData\Local\G1hP\consent.exeC:\Users\Admin\AppData\Local\G1hP\consent.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exeC:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe1⤵
-
C:\Users\Admin\AppData\Local\NkfCnQlK2\SystemPropertiesDataExecutionPrevention.exeC:\Users\Admin\AppData\Local\NkfCnQlK2\SystemPropertiesDataExecutionPrevention.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\9JIjQEt\EhStorAuthn.exeFilesize
137KB
MD53abe95d92c80dc79707d8e168d79a994
SHA164b10c17f602d3f21c84954541e7092bc55bb5ab
SHA2562159d9d5c9355521de859d1c40907fcdfef19f8cf68eda7485b89e9aa119e3ad
SHA51270fee5e87121229bba5c5e5aaa9f028ac0546dc9d38b7a00a81b882c8f8ce4abfdc364a598976b1463cca05e9400db715f8a4478ec61b03a693bbeee18c6ae5c
-
C:\Users\Admin\AppData\Local\9JIjQEt\UxTheme.dllFilesize
886KB
MD5010d3a6e3e75bec52c40b10f0491223e
SHA107cfc9573ab8e740e26ce6fc4491efd2f7cd75e8
SHA256052d58836dd7e7f510039bd213a5f2d3d536f85f198b64e3ac1cc4f8ba0f2539
SHA51243a81b58df2365c0b41d2949756441c89b263d14a96b4dbcf5338e889fefe5e6a680cc497ebe6500ec614815a4c223311c518a98b2e779225d475f710f07b0d1
-
C:\Users\Admin\AppData\Local\G1hP\WTSAPI32.dllFilesize
885KB
MD5370166c3ce94aec2172fd19753faabd0
SHA19cfa416406520a060204897972d2b2fc7b7fd049
SHA256cb74c8214174b132e7ed828a4153295f17ec6b1357333a1e28c822afa9c640a9
SHA512516556f0e157e83fbdb3211ebf7a2c7b22e896558fa5ac0176c7fe0404c9f48a9e184f7e08497b51e4a6ab9450d5c359880793b1474a9cee1ee0d2780c361313
-
C:\Users\Admin\AppData\Local\G1hP\consent.exeFilesize
109KB
MD50b5511674394666e9d221f8681b2c2e6
SHA16e4e720dfc424a12383f0b8194e4477e3bc346dc
SHA256ccad775decb5aec98118b381eeccc6d540928035cfb955abcb4ad3ded390b79b
SHA51200d28a00fd3ceaeae42ba6882ffb42aa4cc8b92b07a10f28df8e1931df4b806aebdcfab1976bf8d5ce0b98c64da19d4ee06a6315734fa5f885ecd1f6e1ff16a7
-
C:\Users\Admin\AppData\Local\NkfCnQlK2\SYSDM.CPLFilesize
884KB
MD552466384e233ffecd7936d5a2b12907b
SHA1231bfd9389ce261db45aba6e635b93578721c624
SHA25646e80aa0d7161acf260d05034ce36e3f5e520036195e1f95b5d9bed5aea0ecd7
SHA512dd9a10027bf4853ca9d81582545cfde621609e1cf70a62ae441a3c246d8bde8745769ebdcabe690ce8d6e6260aa8bd7b701e9c66612f5bea0e36530724d02709
-
C:\Users\Admin\AppData\Local\NkfCnQlK2\SystemPropertiesDataExecutionPrevention.exeFilesize
80KB
MD5e43ff7785fac643093b3b16a9300e133
SHA1a30688e84c0b0a22669148fe87680b34fcca2fba
SHA256c8e1b3ecce673035a934d65b25c43ec23416f5bbf52d772e24e48e6fd3e77e9b
SHA51261260999bb57817dea2d404bcf093820679e597298c752d38db181fe9963b5fa47e070d6a3c7c970905035b396389bb02946b44869dc8b9560acc419b065999a
-
\Users\Admin\AppData\Local\9JIjQEt\EhStorAuthn.exeFilesize
137KB
MD53abe95d92c80dc79707d8e168d79a994
SHA164b10c17f602d3f21c84954541e7092bc55bb5ab
SHA2562159d9d5c9355521de859d1c40907fcdfef19f8cf68eda7485b89e9aa119e3ad
SHA51270fee5e87121229bba5c5e5aaa9f028ac0546dc9d38b7a00a81b882c8f8ce4abfdc364a598976b1463cca05e9400db715f8a4478ec61b03a693bbeee18c6ae5c
-
\Users\Admin\AppData\Local\9JIjQEt\UxTheme.dllFilesize
886KB
MD5010d3a6e3e75bec52c40b10f0491223e
SHA107cfc9573ab8e740e26ce6fc4491efd2f7cd75e8
SHA256052d58836dd7e7f510039bd213a5f2d3d536f85f198b64e3ac1cc4f8ba0f2539
SHA51243a81b58df2365c0b41d2949756441c89b263d14a96b4dbcf5338e889fefe5e6a680cc497ebe6500ec614815a4c223311c518a98b2e779225d475f710f07b0d1
-
\Users\Admin\AppData\Local\G1hP\WTSAPI32.dllFilesize
885KB
MD5370166c3ce94aec2172fd19753faabd0
SHA19cfa416406520a060204897972d2b2fc7b7fd049
SHA256cb74c8214174b132e7ed828a4153295f17ec6b1357333a1e28c822afa9c640a9
SHA512516556f0e157e83fbdb3211ebf7a2c7b22e896558fa5ac0176c7fe0404c9f48a9e184f7e08497b51e4a6ab9450d5c359880793b1474a9cee1ee0d2780c361313
-
\Users\Admin\AppData\Local\G1hP\consent.exeFilesize
109KB
MD50b5511674394666e9d221f8681b2c2e6
SHA16e4e720dfc424a12383f0b8194e4477e3bc346dc
SHA256ccad775decb5aec98118b381eeccc6d540928035cfb955abcb4ad3ded390b79b
SHA51200d28a00fd3ceaeae42ba6882ffb42aa4cc8b92b07a10f28df8e1931df4b806aebdcfab1976bf8d5ce0b98c64da19d4ee06a6315734fa5f885ecd1f6e1ff16a7
-
\Users\Admin\AppData\Local\NkfCnQlK2\SYSDM.CPLFilesize
884KB
MD552466384e233ffecd7936d5a2b12907b
SHA1231bfd9389ce261db45aba6e635b93578721c624
SHA25646e80aa0d7161acf260d05034ce36e3f5e520036195e1f95b5d9bed5aea0ecd7
SHA512dd9a10027bf4853ca9d81582545cfde621609e1cf70a62ae441a3c246d8bde8745769ebdcabe690ce8d6e6260aa8bd7b701e9c66612f5bea0e36530724d02709
-
\Users\Admin\AppData\Local\NkfCnQlK2\SystemPropertiesDataExecutionPrevention.exeFilesize
80KB
MD5e43ff7785fac643093b3b16a9300e133
SHA1a30688e84c0b0a22669148fe87680b34fcca2fba
SHA256c8e1b3ecce673035a934d65b25c43ec23416f5bbf52d772e24e48e6fd3e77e9b
SHA51261260999bb57817dea2d404bcf093820679e597298c752d38db181fe9963b5fa47e070d6a3c7c970905035b396389bb02946b44869dc8b9560acc419b065999a
-
\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\eCjk\SystemPropertiesDataExecutionPrevention.exeFilesize
80KB
MD5e43ff7785fac643093b3b16a9300e133
SHA1a30688e84c0b0a22669148fe87680b34fcca2fba
SHA256c8e1b3ecce673035a934d65b25c43ec23416f5bbf52d772e24e48e6fd3e77e9b
SHA51261260999bb57817dea2d404bcf093820679e597298c752d38db181fe9963b5fa47e070d6a3c7c970905035b396389bb02946b44869dc8b9560acc419b065999a
-
memory/1196-58-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1196-61-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1196-56-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1196-55-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1196-59-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1196-57-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1196-54-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1196-63-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1196-60-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1196-62-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1704-71-0x0000000000000000-mapping.dmp
-
memory/1708-77-0x0000000000000000-mapping.dmp
-
memory/1720-65-0x0000000000000000-mapping.dmp
-
memory/1720-69-0x000007FEFB851000-0x000007FEFB853000-memory.dmpFilesize
8KB