Analysis
-
max time kernel
150s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe
Resource
win10v2004-20220812-en
General
-
Target
65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe
-
Size
141KB
-
MD5
6c998f78e8aebc38978f9dcee5612ed7
-
SHA1
9bb448aacd23e2e9487ec2e232a091405657591e
-
SHA256
65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2
-
SHA512
1e9ed1ed8dc3d34245989f57cc362e2f4df1fe5fbec513bd744a642e51374097935a73ca9279704d4738da650d15271f6bcf08418706e3900547b59bdcbaff77
-
SSDEEP
3072:63K6E+7W76NpQXIYe7Be3W1562s/zTdrYFojfMKhDtrSV:63K/63tY4p62sbhjfMmDte
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 548 65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe 1480 rundll32.exe 1480 rundll32.exe 1480 rundll32.exe 1480 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwesif = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\dwesif.dll\",ATerminatePlay" 65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7042551-4965-11ED-A94D-C6F54D7498C3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1344 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 548 65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe 1344 iexplore.exe 1344 iexplore.exe 916 IEXPLORE.EXE 916 IEXPLORE.EXE 548 65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe 1480 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1344 wrote to memory of 916 1344 iexplore.exe 29 PID 1344 wrote to memory of 916 1344 iexplore.exe 29 PID 1344 wrote to memory of 916 1344 iexplore.exe 29 PID 1344 wrote to memory of 916 1344 iexplore.exe 29 PID 548 wrote to memory of 1480 548 65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe 30 PID 548 wrote to memory of 1480 548 65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe 30 PID 548 wrote to memory of 1480 548 65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe 30 PID 548 wrote to memory of 1480 548 65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe 30 PID 548 wrote to memory of 1480 548 65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe 30 PID 548 wrote to memory of 1480 548 65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe 30 PID 548 wrote to memory of 1480 548 65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe"C:\Users\Admin\AppData\Local\Temp\65429393ecddb6091e885a2b4b7e3aa3014d110ef6a3eff1408791c8a79326c2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\dwesif.dll",HrBSTRToLPSZ2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD5c836f1f3098b4f89b7a161ef1e27dd46
SHA1714a600e9a964287818afbb9e4cd3fc42614f17a
SHA256d0d828414119360f096a52d921d264284794c2602afc9160dc502e6cb02197ff
SHA512fa15669440f6faa6676034000476da1a3e34f5ce980e135bcd88692fbd4b781b687317ae85e4bc270f0eabe2a40efce2c5c3019942f2dd54d92772037ecb0f30
-
Filesize
141KB
MD5c836f1f3098b4f89b7a161ef1e27dd46
SHA1714a600e9a964287818afbb9e4cd3fc42614f17a
SHA256d0d828414119360f096a52d921d264284794c2602afc9160dc502e6cb02197ff
SHA512fa15669440f6faa6676034000476da1a3e34f5ce980e135bcd88692fbd4b781b687317ae85e4bc270f0eabe2a40efce2c5c3019942f2dd54d92772037ecb0f30
-
Filesize
141KB
MD5c836f1f3098b4f89b7a161ef1e27dd46
SHA1714a600e9a964287818afbb9e4cd3fc42614f17a
SHA256d0d828414119360f096a52d921d264284794c2602afc9160dc502e6cb02197ff
SHA512fa15669440f6faa6676034000476da1a3e34f5ce980e135bcd88692fbd4b781b687317ae85e4bc270f0eabe2a40efce2c5c3019942f2dd54d92772037ecb0f30
-
Filesize
141KB
MD5c836f1f3098b4f89b7a161ef1e27dd46
SHA1714a600e9a964287818afbb9e4cd3fc42614f17a
SHA256d0d828414119360f096a52d921d264284794c2602afc9160dc502e6cb02197ff
SHA512fa15669440f6faa6676034000476da1a3e34f5ce980e135bcd88692fbd4b781b687317ae85e4bc270f0eabe2a40efce2c5c3019942f2dd54d92772037ecb0f30
-
Filesize
141KB
MD5c836f1f3098b4f89b7a161ef1e27dd46
SHA1714a600e9a964287818afbb9e4cd3fc42614f17a
SHA256d0d828414119360f096a52d921d264284794c2602afc9160dc502e6cb02197ff
SHA512fa15669440f6faa6676034000476da1a3e34f5ce980e135bcd88692fbd4b781b687317ae85e4bc270f0eabe2a40efce2c5c3019942f2dd54d92772037ecb0f30
-
Filesize
141KB
MD5c836f1f3098b4f89b7a161ef1e27dd46
SHA1714a600e9a964287818afbb9e4cd3fc42614f17a
SHA256d0d828414119360f096a52d921d264284794c2602afc9160dc502e6cb02197ff
SHA512fa15669440f6faa6676034000476da1a3e34f5ce980e135bcd88692fbd4b781b687317ae85e4bc270f0eabe2a40efce2c5c3019942f2dd54d92772037ecb0f30