Analysis
-
max time kernel
157s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 01:39
Static task
static1
Behavioral task
behavioral1
Sample
99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe
Resource
win10v2004-20220812-en
General
-
Target
99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe
-
Size
416KB
-
MD5
338173dfd00cfa43f6978182ba69d6b0
-
SHA1
5495a84a842beca91e1be7bd360cee440df0c467
-
SHA256
99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da
-
SHA512
8d632cc2e29244f1d3b617fe8a8c847237cca49c78ac4fa0c4ea404d3fb14e418e6676c0d54b16ff06d88e723c6c3064b398247527682bd11dd86f5facc1d3d7
-
SSDEEP
6144:bvLxlRBLwCpiD4kXWUu3pmi9ITPNe6oZLKV9VZXDDP9xVDk:bvNlPwCpu44gmewN9gWDh
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IlawEsulr = "regsvr32.exe \"C:\\ProgramData\\IlawEsulr.dat\"" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IlawEsulr = "regsvr32.exe \"C:\\ProgramData\\IlawEsulr.dat\"" 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 3452 3264 WerFault.exe 40 -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" Explorer.EXE -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" Explorer.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\TabProcGrowth = "0" Explorer.EXE -
Modifies registry class 21 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{610D3167-08A9-461F-AF79-4BE974124E5C}\{259E1223-47A1-4031-ACD6-3F9C2A167B74} = 44fbf04e sihost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{610D3167-08A9-461F-AF79-4BE974124E5C} taskhostw.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{5BF918F2-7E99-4E19-9BAC-666C74B01389} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{610D3167-08A9-461F-AF79-4BE974124E5C} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{610D3167-08A9-461F-AF79-4BE974124E5C} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{5BF918F2-7E99-4E19-9BAC-666C74B01389} RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\WOW6432Node\CLSID\{5BF918F2-7E99-4E19-9BAC-666C74B01389}\#sd = 433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c54656d705c393933313762303962653035383363666638633966613565346337613239333231306337666130316366396632336562326633636138366134663863323464612e65786500 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{610D3167-08A9-461F-AF79-4BE974124E5C} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{4819052B-70D1-48C0-A5FD-7E16098E024E} StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{00261E27-52F6-4985-A297-2E1520AD7E1D} StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{5BF918F2-7E99-4E19-9BAC-666C74B01389} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{5BF918F2-7E99-4E19-9BAC-666C74B01389} taskhostw.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{610D3167-08A9-461F-AF79-4BE974124E5C} sihost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{5BF918F2-7E99-4E19-9BAC-666C74B01389} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{5BF918F2-7E99-4E19-9BAC-666C74B01389} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\WOW6432Node\CLSID\{5BF918F2-7E99-4E19-9BAC-666C74B01389} 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{5BF918F2-7E99-4E19-9BAC-666C74B01389}\#cert = 31 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{610D3167-08A9-461F-AF79-4BE974124E5C} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{610D3167-08A9-461F-AF79-4BE974124E5C} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{5BF918F2-7E99-4E19-9BAC-666C74B01389} sihost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2984 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeCreateGlobalPrivilege 2320 sihost.exe Token: SeShutdownPrivilege 2320 sihost.exe Token: SeDebugPrivilege 2320 sihost.exe Token: SeCreateGlobalPrivilege 2448 taskhostw.exe Token: SeShutdownPrivilege 2448 taskhostw.exe Token: SeDebugPrivilege 2448 taskhostw.exe Token: SeCreateGlobalPrivilege 2984 Explorer.EXE Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeDebugPrivilege 2984 Explorer.EXE Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeCreatePagefilePrivilege 2984 Explorer.EXE Token: SeCreateGlobalPrivilege 3356 StartMenuExperienceHost.exe Token: SeShutdownPrivilege 3356 StartMenuExperienceHost.exe Token: SeDebugPrivilege 3356 StartMenuExperienceHost.exe Token: SeCreateGlobalPrivilege 3424 RuntimeBroker.exe Token: SeShutdownPrivilege 3424 RuntimeBroker.exe Token: SeDebugPrivilege 3424 RuntimeBroker.exe Token: SeCreateGlobalPrivilege 3692 RuntimeBroker.exe Token: SeShutdownPrivilege 3692 RuntimeBroker.exe Token: SeDebugPrivilege 3692 RuntimeBroker.exe Token: SeCreateGlobalPrivilege 4596 RuntimeBroker.exe Token: SeShutdownPrivilege 4596 RuntimeBroker.exe Token: SeDebugPrivilege 4596 RuntimeBroker.exe Token: SeCreateGlobalPrivilege 4576 RuntimeBroker.exe Token: SeShutdownPrivilege 4576 RuntimeBroker.exe Token: SeDebugPrivilege 4576 RuntimeBroker.exe Token: SeShutdownPrivilege 3424 RuntimeBroker.exe Token: SeShutdownPrivilege 3424 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2320 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 54 PID 1812 wrote to memory of 2320 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 54 PID 1812 wrote to memory of 2448 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 52 PID 1812 wrote to memory of 2448 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 52 PID 1812 wrote to memory of 2984 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 42 PID 1812 wrote to memory of 2984 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 42 PID 1812 wrote to memory of 3264 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 40 PID 1812 wrote to memory of 3264 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 40 PID 1812 wrote to memory of 3356 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 39 PID 1812 wrote to memory of 3356 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 39 PID 1812 wrote to memory of 3424 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 19 PID 1812 wrote to memory of 3424 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 19 PID 1812 wrote to memory of 3516 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 38 PID 1812 wrote to memory of 3516 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 38 PID 1812 wrote to memory of 3692 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 37 PID 1812 wrote to memory of 3692 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 37 PID 1812 wrote to memory of 4596 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 34 PID 1812 wrote to memory of 4596 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 34 PID 1812 wrote to memory of 4576 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 20 PID 1812 wrote to memory of 4576 1812 99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe 20
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3516
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3264
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3264 -s 8522⤵
- Program crash
PID:3452
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe"C:\Users\Admin\AppData\Local\Temp\99317b09be0583cff8c9fa5e4c7a293210c7fa01cf9f23eb2f3ca86a4f8c24da.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 456 -p 3264 -ip 32641⤵PID:2936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD5d40ad083d38b788a4f0109a71df8c842
SHA1e216e871888e9717b571952ea535ccbe10d9829f
SHA2569c41d5a72c93f46b134f79ed15d99944340288e062faa56e3c8b5170109d9c8e
SHA512db87477865db94563dcd38cae7e6352a4a9a8559530a19b6fe97385557102f36f5e0eb1a2c7455425b3511897da51c384f8e9c17554684cd3df9c9021911dde7
-
Filesize
273KB
MD5d40ad083d38b788a4f0109a71df8c842
SHA1e216e871888e9717b571952ea535ccbe10d9829f
SHA2569c41d5a72c93f46b134f79ed15d99944340288e062faa56e3c8b5170109d9c8e
SHA512db87477865db94563dcd38cae7e6352a4a9a8559530a19b6fe97385557102f36f5e0eb1a2c7455425b3511897da51c384f8e9c17554684cd3df9c9021911dde7