Analysis

  • max time kernel
    152s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-06-2022 04:05

General

  • Target

    1a2ec310ec65184670344e1f00c9ccd64ed7e8030f3ad8ee7250a039589da9c2.dll

  • Size

    224KB

  • MD5

    530850cb621e89af1a084cfa10f7460b

  • SHA1

    db95980c83669df95ca049be4c09b061004d359a

  • SHA256

    1a2ec310ec65184670344e1f00c9ccd64ed7e8030f3ad8ee7250a039589da9c2

  • SHA512

    c8c31a4756d1bc7af8ab721f194eb85ace02e7753a52e7ed7db516e12ef7d0ebb647ada1142103de446d383e6b1413f339b1a7a7081dce0f856636e49919c87f

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1a2ec310ec65184670344e1f00c9ccd64ed7e8030f3ad8ee7250a039589da9c2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1a2ec310ec65184670344e1f00c9ccd64ed7e8030f3ad8ee7250a039589da9c2.dll,#1
      2⤵
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:852
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe
        3⤵
          PID:1496
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          PID:2012
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          PID:1544
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\system32\ctfmon.exe
        ctfmon.exe
        2⤵
        • Suspicious use of FindShellTrayWindow
        PID:112
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1180 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1960

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\RCM5Z2R7.txt

      Filesize

      606B

      MD5

      cd8fb99b4f31ae51a9709c1aa28194e6

      SHA1

      4fa64a930125a7c89092a50dbf868e32d7cd48f0

      SHA256

      9eadcc453d34faf43cc2c9e51aa137912890d46cb79a96c4953dfc633c2f1f3f

      SHA512

      4d4979e4348dc488d44924ee01db68bf0333ba4f5aceb2382d687147a31b4dc73bfb531d472dec8cd82a5ee14bf6455d04a4eb6f78d10d65ddf2e3d63420c934

    • memory/852-55-0x0000000076561000-0x0000000076563000-memory.dmp

      Filesize

      8KB

    • memory/852-57-0x0000000000110000-0x0000000000165000-memory.dmp

      Filesize

      340KB

    • memory/852-58-0x0000000000110000-0x0000000000165000-memory.dmp

      Filesize

      340KB

    • memory/852-59-0x0000000000110000-0x0000000000165000-memory.dmp

      Filesize

      340KB

    • memory/852-61-0x0000000000180000-0x0000000000194000-memory.dmp

      Filesize

      80KB

    • memory/852-60-0x0000000000120000-0x0000000000175000-memory.dmp

      Filesize

      340KB

    • memory/1496-66-0x0000000074B61000-0x0000000074B63000-memory.dmp

      Filesize

      8KB

    • memory/1544-74-0x0000000001EB0000-0x0000000001F05000-memory.dmp

      Filesize

      340KB

    • memory/1544-75-0x0000000001EB0000-0x0000000001F05000-memory.dmp

      Filesize

      340KB

    • memory/1544-77-0x0000000001EB0000-0x0000000001F05000-memory.dmp

      Filesize

      340KB

    • memory/1976-69-0x0000000003A40000-0x0000000003A50000-memory.dmp

      Filesize

      64KB

    • memory/1976-67-0x000007FEFC0B1000-0x000007FEFC0B3000-memory.dmp

      Filesize

      8KB

    • memory/2012-70-0x00000000002F0000-0x0000000000345000-memory.dmp

      Filesize

      340KB

    • memory/2012-71-0x00000000002F0000-0x0000000000345000-memory.dmp

      Filesize

      340KB

    • memory/2012-76-0x00000000002F0000-0x0000000000345000-memory.dmp

      Filesize

      340KB