Analysis

  • max time kernel
    148s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 01:06

General

  • Target

    eb2c36cd555d5273bec3826997e60970fb968652022bd7ef81737a8ec68c9ea2.dll

  • Size

    312KB

  • MD5

    33b4d8ad6272e1064286e1f60f0a3cd0

  • SHA1

    c9d1f24f31b908dc2dcad955c485ba4131c6f8d1

  • SHA256

    eb2c36cd555d5273bec3826997e60970fb968652022bd7ef81737a8ec68c9ea2

  • SHA512

    59c85e5ee8ec2ec541d91ccda1a8b4397f271f3747146a82f77c05e4d6e370cb3eb4475acdb1dc8e488fc6620e3f271e11b5f7db255b5c149d073602ba736113

  • SSDEEP

    6144:is85OSfJEruWEipxlyiFwXGVco4g10L15/XiUB:i3xMvhpxlLVf6XRB

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer Protected Mode
    • Modifies Internet Explorer Protected Mode Banner
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1268
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\eb2c36cd555d5273bec3826997e60970fb968652022bd7ef81737a8ec68c9ea2.dll,#1
      2⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\eb2c36cd555d5273bec3826997e60970fb968652022bd7ef81737a8ec68c9ea2.dll,#1
        3⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1268-58-0x0000000002610000-0x000000000265D000-memory.dmp

    Filesize

    308KB

  • memory/1268-65-0x0000000002610000-0x000000000265D000-memory.dmp

    Filesize

    308KB

  • memory/1268-66-0x00000000029D0000-0x0000000002A38000-memory.dmp

    Filesize

    416KB

  • memory/1488-55-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

    Filesize

    8KB

  • memory/1488-56-0x0000000010000000-0x000000001002E000-memory.dmp

    Filesize

    184KB

  • memory/1488-64-0x0000000010000000-0x0000000010068000-memory.dmp

    Filesize

    416KB

  • memory/1488-68-0x00000000002D0000-0x000000000031D000-memory.dmp

    Filesize

    308KB

  • memory/1488-69-0x00000000008A0000-0x0000000000918000-memory.dmp

    Filesize

    480KB

  • memory/1488-70-0x0000000010000000-0x000000001002E000-memory.dmp

    Filesize

    184KB

  • memory/1960-67-0x0000000000450000-0x00000000004B8000-memory.dmp

    Filesize

    416KB