Analysis

  • max time kernel
    136s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 12:08

General

  • Target

    975c4ffb679d9c4c0cbd70278feeb2ac8751c47d9eea1ecc1cb3cbf0e53fd2b2.dll

  • Size

    580KB

  • MD5

    478a7852e7adc042bcdc773a9657653c

  • SHA1

    3ab493a5ad63a60fe12d2a64c6bfe8779fb5ab14

  • SHA256

    975c4ffb679d9c4c0cbd70278feeb2ac8751c47d9eea1ecc1cb3cbf0e53fd2b2

  • SHA512

    35fec9a55ee2a2bef76f28e9989df35185780e82649490b30dea109aa99a8f4ad8bad07b39339d41dbed651abd48b884635cbbbff244db8d80e1cdd23be52784

  • SSDEEP

    12288:ShpUrEIZJqr1AkBWwNa5R0EYl795/amaX3QXaPKUuZKn:S/jG01NHXaP6Zk

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\975c4ffb679d9c4c0cbd70278feeb2ac8751c47d9eea1ecc1cb3cbf0e53fd2b2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\975c4ffb679d9c4c0cbd70278feeb2ac8751c47d9eea1ecc1cb3cbf0e53fd2b2.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2292
        • C:\Program Files (x86)\Microsoft\WaterMark.exe
          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1044
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
              PID:1964
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 204
                6⤵
                • Program crash
                PID:4464
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4548
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4548 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:4864
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3852
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3852 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:4392
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 628
          3⤵
          • Program crash
          PID:2412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 2732 -ip 2732
      1⤵
        PID:4472
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1964 -ip 1964
        1⤵
          PID:2736

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft\WaterMark.exe

          Filesize

          120KB

          MD5

          132fd3d6c8b1ec1897383745f524b9de

          SHA1

          20d5fdaecc63300ea555e60ea2efd6921aa1fbf7

          SHA256

          0d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf

          SHA512

          d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da

        • C:\Program Files (x86)\Microsoft\WaterMark.exe

          Filesize

          120KB

          MD5

          132fd3d6c8b1ec1897383745f524b9de

          SHA1

          20d5fdaecc63300ea555e60ea2efd6921aa1fbf7

          SHA256

          0d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf

          SHA512

          d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          7de3527d962389a61a0825bebf9031b7

          SHA1

          ffc04b363ec1d3976e454446827d36813002a9b7

          SHA256

          63db191be3bdce3f969a6f457edaa2bf5c9ec863a311540d719ad80ca9ce4a19

          SHA512

          57220b86487cefb01b4c2b9b904a147ea35133f490d5da092dbf10e1568c14a2f1359ed36529edc779335a9f4530c25a67d2065620379eec0e682b03389ae91d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          7de3527d962389a61a0825bebf9031b7

          SHA1

          ffc04b363ec1d3976e454446827d36813002a9b7

          SHA256

          63db191be3bdce3f969a6f457edaa2bf5c9ec863a311540d719ad80ca9ce4a19

          SHA512

          57220b86487cefb01b4c2b9b904a147ea35133f490d5da092dbf10e1568c14a2f1359ed36529edc779335a9f4530c25a67d2065620379eec0e682b03389ae91d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          46891ab25f9001f2bf5bca652182d040

          SHA1

          8be5dae4e0b8066ccc426ada1c490d870792ebf5

          SHA256

          1128cf535d2832702397d84999edb71ff2ef7cb6b12c5b59025d1b31d9d55eb3

          SHA512

          6ced7620f5e97ea7d73797a550d151970d063cd05bfcd5de110e6030c4bd9cfdd7e87ef87777fd30dfbb9de80acdef6cf2296cce4c7f81b8ade3724d6f53f1f8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          7c8484ea2cc64e03fe04472d26617332

          SHA1

          924fa73ece8e3c066984b1be084d0a3be457eee6

          SHA256

          ebac10ab99ea4afbcf5853ee266dfbd00a64876c59bba21df6c72999d75040e0

          SHA512

          dd0d3ce52eab438ac74bf90fe638db4ddc2378f7c5c48f848d98c8e6bf4085bfac8a8bb722bfa2a5523a67783bb0fe09df45a13dbb59c96636f4d94103b2786e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          7c8484ea2cc64e03fe04472d26617332

          SHA1

          924fa73ece8e3c066984b1be084d0a3be457eee6

          SHA256

          ebac10ab99ea4afbcf5853ee266dfbd00a64876c59bba21df6c72999d75040e0

          SHA512

          dd0d3ce52eab438ac74bf90fe638db4ddc2378f7c5c48f848d98c8e6bf4085bfac8a8bb722bfa2a5523a67783bb0fe09df45a13dbb59c96636f4d94103b2786e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          7c8484ea2cc64e03fe04472d26617332

          SHA1

          924fa73ece8e3c066984b1be084d0a3be457eee6

          SHA256

          ebac10ab99ea4afbcf5853ee266dfbd00a64876c59bba21df6c72999d75040e0

          SHA512

          dd0d3ce52eab438ac74bf90fe638db4ddc2378f7c5c48f848d98c8e6bf4085bfac8a8bb722bfa2a5523a67783bb0fe09df45a13dbb59c96636f4d94103b2786e

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8D374116-499C-11ED-AECB-F6DE28FD18F9}.dat

          Filesize

          3KB

          MD5

          9d610a5e9da258795b76214524a283d7

          SHA1

          853a98024caf0f9feecf0ea2318f4528a86ff57e

          SHA256

          2df93a3eb955248445d3e3e558937c597e322895bc0722ee4c26660fa6f39dda

          SHA512

          a7ba7a8d5ce5e10cc774b9785c032807e8dfcb0b29681019da9f79242a76d3b61c4a25d7520f93dd4cd21e7f990ff1a8e86dbcf6faf130cf13de93a0d8a64164

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8D376826-499C-11ED-AECB-F6DE28FD18F9}.dat

          Filesize

          5KB

          MD5

          4cabc65131619f13d930e6a578865999

          SHA1

          d802c9738a4e3e8eec0388db414700003ee4b83a

          SHA256

          5d6109faca3c138fceec51bb022dbf26fb268f1529e988308a0011b6bd48afd5

          SHA512

          de31cf132ea908bde0a109141f611288c975ec2c1dac4b728c0a649a8dd00d647ee9164376f3711066565eca28e824c5e8a1220490cdafa6336c13660c770f94

        • C:\Windows\SysWOW64\rundll32mgr.exe

          Filesize

          120KB

          MD5

          132fd3d6c8b1ec1897383745f524b9de

          SHA1

          20d5fdaecc63300ea555e60ea2efd6921aa1fbf7

          SHA256

          0d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf

          SHA512

          d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da

        • C:\Windows\SysWOW64\rundll32mgr.exe

          Filesize

          120KB

          MD5

          132fd3d6c8b1ec1897383745f524b9de

          SHA1

          20d5fdaecc63300ea555e60ea2efd6921aa1fbf7

          SHA256

          0d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf

          SHA512

          d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da

        • memory/1044-146-0x0000000000400000-0x0000000000431378-memory.dmp

          Filesize

          196KB

        • memory/1044-150-0x0000000000400000-0x0000000000431378-memory.dmp

          Filesize

          196KB

        • memory/1044-149-0x0000000000400000-0x0000000000431378-memory.dmp

          Filesize

          196KB

        • memory/2292-143-0x0000000000590000-0x00000000005C2000-memory.dmp

          Filesize

          200KB

        • memory/2292-142-0x0000000000400000-0x0000000000431378-memory.dmp

          Filesize

          196KB

        • memory/2292-138-0x0000000000590000-0x00000000005C2000-memory.dmp

          Filesize

          200KB

        • memory/2292-137-0x0000000000400000-0x0000000000431378-memory.dmp

          Filesize

          196KB

        • memory/2732-136-0x0000000010000000-0x0000000010092000-memory.dmp

          Filesize

          584KB