Analysis

  • max time kernel
    154s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 11:49

General

  • Target

    f2f4316efa003dac2f39e23f4d84d905ca74f05ee26ef26d01013537d1989472.exe

  • Size

    155KB

  • MD5

    6fbe350589e935c3d7e83dd030b887a8

  • SHA1

    b1b1d6f9d318683b85996c1aedbee49826516b2f

  • SHA256

    f2f4316efa003dac2f39e23f4d84d905ca74f05ee26ef26d01013537d1989472

  • SHA512

    80791870880eb93dea3ee1f9988cc1feb3433f0c40c495b16fe2ca3272c8ff317cda7663ffba3265350f355ae92f62cd4a1bac3f6556faa8262bb3dd499e6aee

  • SSDEEP

    3072:wbm5Jewy+gQ5cL8Hag0iY2gjEkJTDCvEQDh96ytvbw:dBy+Lc8LdDOhgvELytv

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2f4316efa003dac2f39e23f4d84d905ca74f05ee26ef26d01013537d1989472.exe
    "C:\Users\Admin\AppData\Local\Temp\f2f4316efa003dac2f39e23f4d84d905ca74f05ee26ef26d01013537d1989472.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4664
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Roaming\amstb.dll",IndexRecordCount
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:3348
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:3524
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5064 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2232
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5064 CREDAT:82948 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1020
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5064 CREDAT:17414 /prefetch:2
        2⤵
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:5116

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\amstb.dll

      Filesize

      155KB

      MD5

      635582228a444f99eedfb546b1f4d0e0

      SHA1

      23cde35e8a11229dcd1a660c533f1e49120f0d9b

      SHA256

      b05a363fdde81783fc0cbc2ebbd9d6ed01a8157f028725262d5e4e706663ee0d

      SHA512

      b464081073e150b97fcccd1f80c617d9dd17d1312a7a74077b02f7d76c23587a1df4cd4ae22fd0797f787b5f87f197887fa08c8efbfe951b03ad7ed2fde659bc

    • C:\Users\Admin\AppData\Roaming\amstb.dll

      Filesize

      155KB

      MD5

      635582228a444f99eedfb546b1f4d0e0

      SHA1

      23cde35e8a11229dcd1a660c533f1e49120f0d9b

      SHA256

      b05a363fdde81783fc0cbc2ebbd9d6ed01a8157f028725262d5e4e706663ee0d

      SHA512

      b464081073e150b97fcccd1f80c617d9dd17d1312a7a74077b02f7d76c23587a1df4cd4ae22fd0797f787b5f87f197887fa08c8efbfe951b03ad7ed2fde659bc

    • C:\Users\Admin\AppData\Roaming\amstb.dll

      Filesize

      155KB

      MD5

      635582228a444f99eedfb546b1f4d0e0

      SHA1

      23cde35e8a11229dcd1a660c533f1e49120f0d9b

      SHA256

      b05a363fdde81783fc0cbc2ebbd9d6ed01a8157f028725262d5e4e706663ee0d

      SHA512

      b464081073e150b97fcccd1f80c617d9dd17d1312a7a74077b02f7d76c23587a1df4cd4ae22fd0797f787b5f87f197887fa08c8efbfe951b03ad7ed2fde659bc

    • C:\Users\Admin\AppData\Roaming\amstb.dll

      Filesize

      155KB

      MD5

      635582228a444f99eedfb546b1f4d0e0

      SHA1

      23cde35e8a11229dcd1a660c533f1e49120f0d9b

      SHA256

      b05a363fdde81783fc0cbc2ebbd9d6ed01a8157f028725262d5e4e706663ee0d

      SHA512

      b464081073e150b97fcccd1f80c617d9dd17d1312a7a74077b02f7d76c23587a1df4cd4ae22fd0797f787b5f87f197887fa08c8efbfe951b03ad7ed2fde659bc

    • memory/3348-138-0x0000000000000000-mapping.dmp

    • memory/3348-142-0x0000000000C40000-0x0000000000C6A000-memory.dmp

      Filesize

      168KB

    • memory/3348-146-0x00000000008D0000-0x00000000008E3000-memory.dmp

      Filesize

      76KB

    • memory/4664-132-0x0000000000540000-0x0000000000553000-memory.dmp

      Filesize

      76KB

    • memory/4664-133-0x0000000000570000-0x000000000059A000-memory.dmp

      Filesize

      168KB

    • memory/4664-137-0x0000000000540000-0x0000000000553000-memory.dmp

      Filesize

      76KB