Analysis

  • max time kernel
    110s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 12:05

General

  • Target

    baebe3a7351c7e82c729c06d2fa7f325894d74318d12260b18c51ba3831f7417.dll

  • Size

    922KB

  • MD5

    69266422d558e7d94713d25dadded350

  • SHA1

    6cdb1c2c853ad0e4663802673a006d233e82019a

  • SHA256

    baebe3a7351c7e82c729c06d2fa7f325894d74318d12260b18c51ba3831f7417

  • SHA512

    fa721af30fac2fa7b4407363a7f72fc7a9ee76618ae5f119031d2498d51b55874fbb77c3531c56a1025b3a528ef0b094d51a46d3f367fb92a97c6861ca4b08de

  • SSDEEP

    12288:53RWz/CTxoOAjzHljSA6cg8rPbSHYIkhEmEazstA+UinhcoqzJPYoO8lrS9Ehc96:zRbEluQYYIkhwazrQzqlP+9EhWwIg

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\baebe3a7351c7e82c729c06d2fa7f325894d74318d12260b18c51ba3831f7417.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1164
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\baebe3a7351c7e82c729c06d2fa7f325894d74318d12260b18c51ba3831f7417.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1292
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:672
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1320
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1912

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{486501C1-4994-11ED-B19F-72E6D75F6BEB}.dat

          Filesize

          5KB

          MD5

          d027d119c0030d5da36ecea4cecf9935

          SHA1

          58e991433a440f1f384a528b7804db32560acf24

          SHA256

          e80e67de6b1cf8291080da833803bfa1ae5debdf109ff21515d0a9a164a7180e

          SHA512

          05aa9becf0d50d43e0b557625cda84dc6f99bdcfa7a433370d3939884d7673bbc3c4b3751dff1f39183e3c7545e7a2b2f07ec63a79add7f1aaefbedeb5914aa4

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{486528D1-4994-11ED-B19F-72E6D75F6BEB}.dat

          Filesize

          3KB

          MD5

          e899cadeccb8834b599d8c4f7e067372

          SHA1

          70e8decc3f562622f49749d83c24f44d5e2ce4c3

          SHA256

          902e3794f0ff419ed3cef1be25679c2f57dd9dd0ccfd49b7a0f69147e7e1c6a8

          SHA512

          9df7c0331fae0333ea8c3c8ad0cf6ab461ee240a370b00b715a5b5504e20395de8036d605fce85d9c7f9b97858db6aa5e3d1cb4bed3318d9b3a8c4ba5d92ed37

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KXJDYLT8.txt

          Filesize

          603B

          MD5

          58aa39d54ffbc4a1e9414572f52b506d

          SHA1

          d47c6bb9293fc2046e9dd2b48dfd28785cd7c4b6

          SHA256

          8a802c1aa21af0558c76cab6905e0eded7c42681b9a6bd70b0a019b4c3e2c4e5

          SHA512

          37b316b493ffb808f00ff30679b8cd4d727d01d642b61ee80f246f9d25004c63c823fdd0fcdf077ce6ab27a66aab60b02d5ef187ec30783feae2c64cc23e09e6

        • C:\Windows\SysWOW64\rundll32mgr.exe

          Filesize

          173KB

          MD5

          77c5d1f7d9596e57a88f4dbcf3fef526

          SHA1

          fb265bb6a2cc331edb70b90d36d42ec6e61544ab

          SHA256

          d09416051d3a9cb33fa22cea2347fab648bfb262d58a5f26bde7da61a7fefae0

          SHA512

          4d24d309469c834d663f62ae31b52ccd1ca2d0dc73d07d0e4bb19d78fe955ae040554062a972d17106e1a6da738002ceb87a5ccb65517374ba2cca966bb87d3c

        • \Windows\SysWOW64\rundll32mgr.exe

          Filesize

          173KB

          MD5

          77c5d1f7d9596e57a88f4dbcf3fef526

          SHA1

          fb265bb6a2cc331edb70b90d36d42ec6e61544ab

          SHA256

          d09416051d3a9cb33fa22cea2347fab648bfb262d58a5f26bde7da61a7fefae0

          SHA512

          4d24d309469c834d663f62ae31b52ccd1ca2d0dc73d07d0e4bb19d78fe955ae040554062a972d17106e1a6da738002ceb87a5ccb65517374ba2cca966bb87d3c

        • \Windows\SysWOW64\rundll32mgr.exe

          Filesize

          173KB

          MD5

          77c5d1f7d9596e57a88f4dbcf3fef526

          SHA1

          fb265bb6a2cc331edb70b90d36d42ec6e61544ab

          SHA256

          d09416051d3a9cb33fa22cea2347fab648bfb262d58a5f26bde7da61a7fefae0

          SHA512

          4d24d309469c834d663f62ae31b52ccd1ca2d0dc73d07d0e4bb19d78fe955ae040554062a972d17106e1a6da738002ceb87a5ccb65517374ba2cca966bb87d3c

        • memory/1516-62-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1516-65-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1928-61-0x00000000001F0000-0x0000000000257000-memory.dmp

          Filesize

          412KB

        • memory/1928-56-0x0000000010000000-0x00000000102EA000-memory.dmp

          Filesize

          2.9MB

        • memory/1928-55-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

          Filesize

          8KB