Analysis

  • max time kernel
    163s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 08:22

General

  • Target

    0ea9bcdb91403808d4021a23cf4fc19ba59039a5bb07ecf7eb2754433ea0b6f9.dll

  • Size

    351KB

  • MD5

    66ba1154bc762e559abec3381cad91e0

  • SHA1

    59f7d1275db0cd833393371b4ee18ff355d397f1

  • SHA256

    0ea9bcdb91403808d4021a23cf4fc19ba59039a5bb07ecf7eb2754433ea0b6f9

  • SHA512

    494772769c554e56c9515b04faf26e68b872713cae38f8b4a9ea34ba4e0bd8c2af93d3a1efafe5a51e10968586e0005543868d8499c2e672edd319f678524c32

  • SSDEEP

    6144:bxUKFcZft0ko5cPeIR/3ElxcCEjbucVry9xCTF6F1ifFC3I8t2tni5U:bk2ko5kapmmaSUFC7Yi5U

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2348
  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3436
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
      PID:3520
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3736
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4700
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3372
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:3284
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 3284 -s 760
          2⤵
          • Program crash
          PID:3332
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
        • Adds Run key to start application
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:3032
        • C:\Windows\system32\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\0ea9bcdb91403808d4021a23cf4fc19ba59039a5bb07ecf7eb2754433ea0b6f9.dll,#1
          2⤵
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1016
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\Temp\0ea9bcdb91403808d4021a23cf4fc19ba59039a5bb07ecf7eb2754433ea0b6f9.dll,#1
            3⤵
            • Loads dropped DLL
            • Adds Run key to start application
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1604
      • C:\Windows\system32\taskhostw.exe
        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
        1⤵
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2480
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 444 -p 3284 -ip 3284
        1⤵
          PID:828

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\botdft.dat

          Filesize

          302KB

          MD5

          ab5f30882f49714171af0762f76e05fb

          SHA1

          b3ed7bf8910958f88586d14bf9edc248c9f09299

          SHA256

          41b72e1121c465bb180d8d967a0c9bc7723770f0b2ffbe5ab5ecf8eadb1275af

          SHA512

          2df8cd2f4e04dee3e661e610a4534af06acd1411420d26a367006a10e13b6400f58fda08a65272335f50a9214b6bd2486b3c36b59c2ba4a951d2ac73053b22fc

        • C:\ProgramData\botdft.dat

          Filesize

          302KB

          MD5

          ab5f30882f49714171af0762f76e05fb

          SHA1

          b3ed7bf8910958f88586d14bf9edc248c9f09299

          SHA256

          41b72e1121c465bb180d8d967a0c9bc7723770f0b2ffbe5ab5ecf8eadb1275af

          SHA512

          2df8cd2f4e04dee3e661e610a4534af06acd1411420d26a367006a10e13b6400f58fda08a65272335f50a9214b6bd2486b3c36b59c2ba4a951d2ac73053b22fc

        • C:\ProgramData\botdft.dat

          Filesize

          302KB

          MD5

          ab5f30882f49714171af0762f76e05fb

          SHA1

          b3ed7bf8910958f88586d14bf9edc248c9f09299

          SHA256

          41b72e1121c465bb180d8d967a0c9bc7723770f0b2ffbe5ab5ecf8eadb1275af

          SHA512

          2df8cd2f4e04dee3e661e610a4534af06acd1411420d26a367006a10e13b6400f58fda08a65272335f50a9214b6bd2486b3c36b59c2ba4a951d2ac73053b22fc

        • memory/1016-166-0x00007FFF964D0000-0x00007FFF966C5000-memory.dmp

          Filesize

          2.0MB

        • memory/1016-158-0x00007FFF964D0000-0x00007FFF966C5000-memory.dmp

          Filesize

          2.0MB

        • memory/1016-159-0x000001D0A4760000-0x000001D0A47C9000-memory.dmp

          Filesize

          420KB

        • memory/1604-140-0x0000000002DF0000-0x0000000002E4E000-memory.dmp

          Filesize

          376KB

        • memory/1604-153-0x0000000010000000-0x0000000010056000-memory.dmp

          Filesize

          344KB

        • memory/1604-165-0x0000000003AF0000-0x0000000003B68000-memory.dmp

          Filesize

          480KB

        • memory/1604-164-0x0000000002DF0000-0x0000000002E1F000-memory.dmp

          Filesize

          188KB

        • memory/1604-138-0x0000000002DF0000-0x0000000002E1F000-memory.dmp

          Filesize

          188KB

        • memory/1604-163-0x0000000010000000-0x0000000010044000-memory.dmp

          Filesize

          272KB

        • memory/1604-162-0x0000000003AF0000-0x0000000003B68000-memory.dmp

          Filesize

          480KB

        • memory/1604-161-0x0000000003A60000-0x0000000003AAE000-memory.dmp

          Filesize

          312KB

        • memory/1604-160-0x0000000002DF0000-0x0000000002E4E000-memory.dmp

          Filesize

          376KB

        • memory/1604-134-0x0000000010000000-0x0000000010044000-memory.dmp

          Filesize

          272KB

        • memory/1604-133-0x0000000010000000-0x0000000010056000-memory.dmp

          Filesize

          344KB

        • memory/2348-142-0x00007FFF964D0000-0x00007FFF964D2000-memory.dmp

          Filesize

          8KB

        • memory/2348-143-0x0000000000DE0000-0x0000000000E2E000-memory.dmp

          Filesize

          312KB

        • memory/2348-144-0x00000152B49C0000-0x00000152B4A29000-memory.dmp

          Filesize

          420KB

        • memory/2480-145-0x00007FFF964D0000-0x00007FFF964D2000-memory.dmp

          Filesize

          8KB

        • memory/2480-146-0x00000159A7140000-0x00000159A71A9000-memory.dmp

          Filesize

          420KB

        • memory/3032-148-0x0000000002F20000-0x0000000002F89000-memory.dmp

          Filesize

          420KB

        • memory/3032-147-0x00007FFF964D0000-0x00007FFF964D2000-memory.dmp

          Filesize

          8KB

        • memory/3372-150-0x0000016210B00000-0x0000016210B69000-memory.dmp

          Filesize

          420KB

        • memory/3372-149-0x00007FFF964D0000-0x00007FFF964D2000-memory.dmp

          Filesize

          8KB

        • memory/3436-152-0x000001BEC1790000-0x000001BEC17F9000-memory.dmp

          Filesize

          420KB

        • memory/3436-151-0x00007FFF964D0000-0x00007FFF964D2000-memory.dmp

          Filesize

          8KB

        • memory/3736-155-0x000001B4A3500000-0x000001B4A3569000-memory.dmp

          Filesize

          420KB

        • memory/3736-154-0x00007FFF964D0000-0x00007FFF964D2000-memory.dmp

          Filesize

          8KB

        • memory/4700-156-0x00007FFF964D0000-0x00007FFF964D2000-memory.dmp

          Filesize

          8KB

        • memory/4700-157-0x000001200C240000-0x000001200C2A9000-memory.dmp

          Filesize

          420KB