Analysis

  • max time kernel
    97s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2022 22:09

General

  • Target

    9a78c58d515e501abd5f93d196f8452c1a62736454b7313e8ee26d1fbd20b0d2.dll

  • Size

    497KB

  • MD5

    91e468a26d3874218232010daf7242fe

  • SHA1

    99d849b7b1949ce57d08baa46873aecb5cc6f304

  • SHA256

    9a78c58d515e501abd5f93d196f8452c1a62736454b7313e8ee26d1fbd20b0d2

  • SHA512

    baf343f5e5f74179450071521e56eb0fbefff00c815ca01626185442e5b16438334eef44f59f3846a880658ca3af65df45b39353e8e3fbcc8bd41aa581e49c77

  • SSDEEP

    12288:xNrMi/MhNrcnzlElRcsUhOsyG3s1AsEOO:/D/MhNgyRc5sJYns

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9a78c58d515e501abd5f93d196f8452c1a62736454b7313e8ee26d1fbd20b0d2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9a78c58d515e501abd5f93d196f8452c1a62736454b7313e8ee26d1fbd20b0d2.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c takeown /f "C:\Windows\system32\msimg64.dll" && icacls "C:\Windows\system32\msimg64.dll" /grant administrators:F
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:960
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f "C:\Windows\system32\msimg64.dll"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:396
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Windows\system32\msimg64.dll" /grant administrators:F
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:4472
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" www.google.com
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4620
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4620 CREDAT:17410 /prefetch:2
          4⤵
          • Loads dropped DLL
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1644

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    d3ff0edeee7d1ea5754d8a290ae01189

    SHA1

    253ee24a4776d30bac0aedd7ea213adea6acb6f9

    SHA256

    e2e542a3681c428c021d38e608dffa43da666f6f3c53f623c21dc184639b222b

    SHA512

    ab14449059ae31856026e8d8cb0ec0b4158da0fd19f2a73940a159574a9084ce6a09ac05fb80ef3ab11cd9b1395dce021872215baced48f9e8a0bf7311000db7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    6121387d53a36772ab62c39d96c5bbb9

    SHA1

    9c5c1f16702b8442be4c361e8b11258235dc8c36

    SHA256

    c7fd3a58e7aa27713c8d0ffd868240458baf4decd1d10e96c3bf1e1de262df99

    SHA512

    4274a2314acc9887ed63912c73a45cd1f9eaf3f10968600c3ca8362bea0db7c11785264285e57601c4a721de94368feca232919a1d9c3564fa21899326e4f120

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.dat
    Filesize

    5KB

    MD5

    7ef3ea4480eaa319d834e90344a7f2f9

    SHA1

    edab48207eac20bf67da0d2308a3a3b6db4213d1

    SHA256

    b61736416ae2dd88d4664251e625d3878bff3f52f3b5e1a876fe18649ad52f7d

    SHA512

    537a6acffd414259ef8f394138ec542040c69ee19a81c92f14e9f92235e3d6b2e5b8e5bc84aa282eb402185a6b585a944360be38ccc462009defd17bd4b6ce67

  • C:\Windows\SysWOW64\msimg64.dll
    Filesize

    178KB

    MD5

    81cfde0d21674039ba098ac02b541d5e

    SHA1

    49b09c5afd5b7292030e8bc7f12be160f1e17c88

    SHA256

    8ffc41824530337e072481d3dbf091be3065facd95749775b205768c2d91e33d

    SHA512

    03c1dd0c2b059f81911d3d6c790d640ec01be3c40ac5c38b1d491ef75a4b73d4fe8df3da9803aa7db4a3bd0ba93c95950b6cc82d765db224cfe1cada69fad2f4

  • C:\Windows\SysWOW64\msimg64.dll
    Filesize

    178KB

    MD5

    81cfde0d21674039ba098ac02b541d5e

    SHA1

    49b09c5afd5b7292030e8bc7f12be160f1e17c88

    SHA256

    8ffc41824530337e072481d3dbf091be3065facd95749775b205768c2d91e33d

    SHA512

    03c1dd0c2b059f81911d3d6c790d640ec01be3c40ac5c38b1d491ef75a4b73d4fe8df3da9803aa7db4a3bd0ba93c95950b6cc82d765db224cfe1cada69fad2f4

  • C:\Windows\SysWOW64\msimg64.dll
    Filesize

    178KB

    MD5

    81cfde0d21674039ba098ac02b541d5e

    SHA1

    49b09c5afd5b7292030e8bc7f12be160f1e17c88

    SHA256

    8ffc41824530337e072481d3dbf091be3065facd95749775b205768c2d91e33d

    SHA512

    03c1dd0c2b059f81911d3d6c790d640ec01be3c40ac5c38b1d491ef75a4b73d4fe8df3da9803aa7db4a3bd0ba93c95950b6cc82d765db224cfe1cada69fad2f4

  • memory/396-134-0x0000000000000000-mapping.dmp
  • memory/960-133-0x0000000000000000-mapping.dmp
  • memory/2160-132-0x0000000000000000-mapping.dmp
  • memory/4472-136-0x0000000000000000-mapping.dmp