Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-06-2022 00:51
Static task
static1
Behavioral task
behavioral1
Sample
435d51cacb6bd9222d3165df22c2306e072403f0765a6f57224ab5a732305ae0.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
435d51cacb6bd9222d3165df22c2306e072403f0765a6f57224ab5a732305ae0.dll
Resource
win10v2004-20220414-en
General
-
Target
435d51cacb6bd9222d3165df22c2306e072403f0765a6f57224ab5a732305ae0.dll
-
Size
199KB
-
MD5
2bd1db3a5357dcf620bf979eee24d073
-
SHA1
089424f4975b51b4f549ca7c261f553da3aa0a8d
-
SHA256
435d51cacb6bd9222d3165df22c2306e072403f0765a6f57224ab5a732305ae0
-
SHA512
f009d9feb6cc4e2eb96f410b86cd8fb78b865e25d600172a613c11bdb0f484f0bb549d8daf0656330923f8bca79f7b5aa8bc11692e4e62e1b4c78a746d084a40
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Processes:
resource yara_rule behavioral1/memory/1984-69-0x0000000000270000-0x00000000002BC000-memory.dmp upx -
Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
Processes:
notepad.exenotepad.exerundll32.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
Processes:
rundll32.exenotepad.exenotepad.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" notepad.exe -
Processes:
iexplore.exeIEXPLORE.EXEnotepad.exeexplorer.exenotepad.exerundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f015f9496680d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004863fcdc101a3947b120786fa95ba35b00000000020000000000106600000001000020000000092d4a96a66a101348205661fc5404d37ec2c3af27c96aabad0d7ad368840a82000000000e80000000020000200000002ef5b4d8b512779b0541ab36928c0b735854ab6a2946b3456e67885e9d99535b20000000e315c4d78e89562d6d84bebcbf9dee9c60f90b6515f291605d1dfa1caa81523040000000d61e3289b2955a74d341034bff9cf34b6ddc8c8881d8749d1d2e9901a906777d1f5730ba656a1c04920c6f605a7189b0024c8e9e4a49abf459b176f76f678f53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52E11551-EC59-11EC-AF97-C2F2D41BD72F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main notepad.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "362027868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exenotepad.exenotepad.exepid process 1928 rundll32.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1560 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1928 rundll32.exe 1928 rundll32.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe 1984 notepad.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
iexplore.exectfmon.exepid process 1164 iexplore.exe 1164 iexplore.exe 1164 iexplore.exe 1164 iexplore.exe 1164 iexplore.exe 1164 iexplore.exe 1164 iexplore.exe 1164 iexplore.exe 1164 iexplore.exe 1164 iexplore.exe 468 ctfmon.exe 468 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1164 iexplore.exe 1164 iexplore.exe 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
rundll32.exerundll32.exeexplorer.exeiexplore.exedescription pid process target process PID 1964 wrote to memory of 1928 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1928 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1928 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1928 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1928 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1928 1964 rundll32.exe rundll32.exe PID 1964 wrote to memory of 1928 1964 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1176 1928 rundll32.exe explorer.exe PID 1928 wrote to memory of 1176 1928 rundll32.exe explorer.exe PID 1928 wrote to memory of 1176 1928 rundll32.exe explorer.exe PID 1928 wrote to memory of 1176 1928 rundll32.exe explorer.exe PID 1928 wrote to memory of 1984 1928 rundll32.exe notepad.exe PID 1928 wrote to memory of 1984 1928 rundll32.exe notepad.exe PID 1928 wrote to memory of 1984 1928 rundll32.exe notepad.exe PID 1928 wrote to memory of 1984 1928 rundll32.exe notepad.exe PID 1736 wrote to memory of 468 1736 explorer.exe ctfmon.exe PID 1736 wrote to memory of 468 1736 explorer.exe ctfmon.exe PID 1736 wrote to memory of 468 1736 explorer.exe ctfmon.exe PID 1928 wrote to memory of 1984 1928 rundll32.exe notepad.exe PID 1164 wrote to memory of 1900 1164 iexplore.exe IEXPLORE.EXE PID 1164 wrote to memory of 1900 1164 iexplore.exe IEXPLORE.EXE PID 1164 wrote to memory of 1900 1164 iexplore.exe IEXPLORE.EXE PID 1164 wrote to memory of 1900 1164 iexplore.exe IEXPLORE.EXE PID 1928 wrote to memory of 1560 1928 rundll32.exe notepad.exe PID 1928 wrote to memory of 1560 1928 rundll32.exe notepad.exe PID 1928 wrote to memory of 1560 1928 rundll32.exe notepad.exe PID 1928 wrote to memory of 1560 1928 rundll32.exe notepad.exe PID 1928 wrote to memory of 1560 1928 rundll32.exe notepad.exe PID 1928 wrote to memory of 1164 1928 rundll32.exe iexplore.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\435d51cacb6bd9222d3165df22c2306e072403f0765a6f57224ab5a732305ae0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\435d51cacb6bd9222d3165df22c2306e072403f0765a6f57224ab5a732305ae0.dll,#12⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:1176
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\ctfmon.exectfmon.exe2⤵
- Suspicious use of FindShellTrayWindow
PID:468
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1164 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606B
MD594f27efc230f55e13fd21623241b1575
SHA123a5f4735f15fc071b38b08c88c17d26e907ee14
SHA25656e90bbdc8dd837890487d36f2ec29501d1e1575a7b5163e4fed56b94069c58a
SHA512d81a7a06c436d90d0c301249e2bfee4b25b5b13b59d60c2e484636e19ff37fa8b89a275fc3061376f584196a501b5ce20fabd4b8cded94ea6864b81ebbb24077