Analysis

  • max time kernel
    109s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 15:10

General

  • Target

    b3ec6bb833f63625b13372eaf2ce6996130765a98446b29f6faa592125041724.exe

  • Size

    25KB

  • MD5

    1fa3998bdcfd65ce8fff76175f18b055

  • SHA1

    d718056cd87d39a10495eb610e3ec431df9c9e45

  • SHA256

    b3ec6bb833f63625b13372eaf2ce6996130765a98446b29f6faa592125041724

  • SHA512

    f9bcc92c0b93f14d9c3ca62260d751cc0071f3ff2ed52db6c0b2a6967adaa863b47869204ff000d3a18f50a2474dcd5fb9370f63e3a9662f4b588e966753ade3

  • SSDEEP

    384:/TlT/W+52Y+nyDGJp7oFtwcp/mDpQjlp0huQSNyPVbkTtnJWAEJc3zia:7lTf8Y+yiJp7oQkK28VghJWAEC3b

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 49 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3ec6bb833f63625b13372eaf2ce6996130765a98446b29f6faa592125041724.exe
    "C:\Users\Admin\AppData\Local\Temp\b3ec6bb833f63625b13372eaf2ce6996130765a98446b29f6faa592125041724.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628546.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628546.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1648
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628546.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628546.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:524
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:524 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2016
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628635.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628635.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:2
          4⤵
          • Suspicious use of SetWindowsHookEx
          PID:1012
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628635.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628635.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:832 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1720
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\_zh.bat
      2⤵
      • Deletes itself
      PID:1640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{75E9A2F1-386D-11ED-A03D-460E09B1FADA}.dat

    Filesize

    5KB

    MD5

    ea0fe91b2e30148dbd1929d208f05f84

    SHA1

    fac3fbb6fd540fc9fae1524a41ad34354ba954d2

    SHA256

    b52519e536f970db225baf63d994defa76164f99822b42a7b75b72ccf00d7ce3

    SHA512

    4e670bea846708a95c512abd30c64513c337641267f352c56642c008a4159beb3d5efd0b1df79f9602a8f4e021a6d813f0b20bf00bb53cb6fe0b05c185fdc0ec

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{75F3DC21-386D-11ED-A03D-460E09B1FADA}.dat

    Filesize

    3KB

    MD5

    51ae354194f16f5c92b95422563a2c52

    SHA1

    018d2343bf34952ca41943dea41d1b47cb417964

    SHA256

    1e6ae6a3a4962de1fb134e27fea51c7ac832c4ac6e345be818041b0990918c88

    SHA512

    3e45f093b8668e2fb664770217d121aa5946821d34193f5e49c6d4382d85e8f7eb8402c6319ab60e72c0673723c1ac767fee1f2667635d981337147d370e7fd4

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{75F3DC21-386D-11ED-A03D-460E09B1FADA}.dat

    Filesize

    5KB

    MD5

    a21f5a32a78d6299211ef1ff71bcc1a3

    SHA1

    8bc7ce6dc915a87f257e27a500faf2380401dd1d

    SHA256

    1fef64405fb94d96ce527339aea4c8773ba2db507c262c45c2b0da8a08fc3ea2

    SHA512

    8581097301828435dcda98c0d7128410ec453f2f3775a9bea26886ff829a93ebe717040f8e92f13d84a9098354cd0d63c86818e484ee7f80d4159bebb5159d49

  • C:\Users\Admin\AppData\Local\Temp\_zh.bat

    Filesize

    248B

    MD5

    dcb8d6a37552cee0f8112c87e1e01d40

    SHA1

    9e2323faf00c5ec44010d45602915e01ebc1d174

    SHA256

    2f06ea2399b880b9a2e8b9dd4f62930d1ea4506e410bd6635075fa80decbf51e

    SHA512

    c745d6d5c73e4e752f0b418c19551677564193ecc12aff4e8beebd13b32d96c02c5c0eb0dd981a89921468578875cb82c0483a2598b48124d047715b3a214f55

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\I853BNLK.txt

    Filesize

    608B

    MD5

    2cc1aff4633c4c1618337859062ea8e4

    SHA1

    c08ac4117efc385c16e4d359736586500d507d94

    SHA256

    8b90cb85a1fdbeafb76cef0e10addd82bdd33603d9bb1415ddf6d86cddd46030

    SHA512

    f0ae2621a47dcf15de44c566ba47661fd5d8e2c054eb4b081d0ce22c664dd0fd763af560d357f81198e86c34b08016479948eded51828e714ac666aca867e017

  • \Windows\SysWOW64\tarpurd32.dll

    Filesize

    44KB

    MD5

    2a4c90b7c7f4d5bee9b17a4476cc4213

    SHA1

    4c3f82e45c38cb1d9b449da774a4f58d78f931b5

    SHA256

    e0a526ee76b4c57deafdcfc2f129587e5739d3eddadb1286cd927008c001a143

    SHA512

    3828237e30cf2a3cbe58c212a6c5bfc598cef7916ae4cb4518b7c32c619d9f9eb5885ff623449813cf0e30f707dd35668e22411ab70df1c5009210a9865def20

  • memory/1484-58-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB