Analysis

  • max time kernel
    100s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 12:25

General

  • Target

    ef3af5f4e85ba71dff437f88194dc37a517b8d44b7acf443f3b8047bc0a6d6ac.dll

  • Size

    148KB

  • MD5

    9648ab174db757da38485c0e7304aa29

  • SHA1

    3b12f4e2774830ffe65d6046608d3d4068936f74

  • SHA256

    ef3af5f4e85ba71dff437f88194dc37a517b8d44b7acf443f3b8047bc0a6d6ac

  • SHA512

    82f2443f5b07f02bfa6ec3e0fec0acd2ad6904d42d8b80547d5f5c32fc0f39e3a2d568767b2a83fa739dfba0da7f0da32cd48cbc46810b45b5d6df7e20a45710

  • SSDEEP

    3072:npFgQp67Vf5T6hZaBrTlxSWTIlBD8JY4MR:b76hcatT3LTK6JY4MR

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ef3af5f4e85ba71dff437f88194dc37a517b8d44b7acf443f3b8047bc0a6d6ac.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ef3af5f4e85ba71dff437f88194dc37a517b8d44b7acf443f3b8047bc0a6d6ac.dll,#1
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:436
        • C:\Program Files (x86)\Microsoft\WaterMark.exe
          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:2300
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
              PID:5040
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 208
                6⤵
                • Program crash
                PID:4628
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:528
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:528 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:1928
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1332
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1332 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2488
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5040 -ip 5040
      1⤵
        PID:1348

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\Microsoft\WaterMark.exe

              Filesize

              59KB

              MD5

              0e0f0ae845d89c22bb6385f64a6b85fd

              SHA1

              0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

              SHA256

              5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

              SHA512

              baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

            • C:\Program Files (x86)\Microsoft\WaterMark.exe

              Filesize

              59KB

              MD5

              0e0f0ae845d89c22bb6385f64a6b85fd

              SHA1

              0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

              SHA256

              5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

              SHA512

              baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              471B

              MD5

              7550b85aee4221c59808672005ed8855

              SHA1

              aeb269eff06f518132b9ecea824523fa125ba2d2

              SHA256

              2b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2

              SHA512

              216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              471B

              MD5

              7550b85aee4221c59808672005ed8855

              SHA1

              aeb269eff06f518132b9ecea824523fa125ba2d2

              SHA256

              2b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2

              SHA512

              216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              434B

              MD5

              258495fe7f88e22a485cba2a91644c52

              SHA1

              f8739b29a037116fe03191e4a8b6e6221afd7f26

              SHA256

              928748dae1dc0e17606780f4f94aa4d0b16d378b11a84d45d1d496f22501e7b7

              SHA512

              ca2a6f76c368ed332d2227174a0ae852993dd83e2cf78a395094058f72f1a3c97ec8935c8ac5e65c01f2b771e330831f6c4cd3720a6da4ef3d91e110cc21b5d6

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              434B

              MD5

              258495fe7f88e22a485cba2a91644c52

              SHA1

              f8739b29a037116fe03191e4a8b6e6221afd7f26

              SHA256

              928748dae1dc0e17606780f4f94aa4d0b16d378b11a84d45d1d496f22501e7b7

              SHA512

              ca2a6f76c368ed332d2227174a0ae852993dd83e2cf78a395094058f72f1a3c97ec8935c8ac5e65c01f2b771e330831f6c4cd3720a6da4ef3d91e110cc21b5d6

            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4EED044B-51CE-11ED-B696-F22D08015D11}.dat

              Filesize

              5KB

              MD5

              d80a4c1ca07d09241108b22c9e48f274

              SHA1

              3b02a194a3f09832320727a9deffd01865080c37

              SHA256

              273dc1dc03e9d91efec8c656d72c8dc4c66977c3df20320355d6ed4c5484713c

              SHA512

              97ab11059c229bfbb01b7bda9033d88bd8364b9c6e504dc57b05e3f979a3b58a416df3c2929a57841560641dba34002a994e0eee7c399e1e857bc94e57980f80

            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4EF42CEB-51CE-11ED-B696-F22D08015D11}.dat

              Filesize

              5KB

              MD5

              dd76746fe9c63380be8e52bfd2c01522

              SHA1

              9aed47eb42e31b2abb8f9875f5427c27b7acb33c

              SHA256

              b97d2ad456b98804f480271f64647b3f935449376a433aa66b8c2fbdea0efec8

              SHA512

              0bbbb3b8cdbd98aa4ba3ad4593799d7a9c1215e40f15772c40f77f8f030cd4fa165a766cafa2698a009d22006f4b9e7780bb8d3f7d4a68799f6fc54cb270da2f

            • C:\Windows\SysWOW64\rundll32mgr.exe

              Filesize

              59KB

              MD5

              0e0f0ae845d89c22bb6385f64a6b85fd

              SHA1

              0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

              SHA256

              5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

              SHA512

              baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

            • C:\Windows\SysWOW64\rundll32mgr.exe

              Filesize

              59KB

              MD5

              0e0f0ae845d89c22bb6385f64a6b85fd

              SHA1

              0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

              SHA256

              5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

              SHA512

              baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

            • memory/436-143-0x0000000000400000-0x0000000000421000-memory.dmp

              Filesize

              132KB

            • memory/436-139-0x0000000000400000-0x0000000000421000-memory.dmp

              Filesize

              132KB

            • memory/436-138-0x0000000000400000-0x0000000000421000-memory.dmp

              Filesize

              132KB

            • memory/1404-150-0x0000000010000000-0x0000000010027000-memory.dmp

              Filesize

              156KB

            • memory/2300-151-0x0000000000400000-0x0000000000423000-memory.dmp

              Filesize

              140KB

            • memory/2300-156-0x0000000000400000-0x0000000000423000-memory.dmp

              Filesize

              140KB

            • memory/2300-157-0x0000000000400000-0x0000000000423000-memory.dmp

              Filesize

              140KB

            • memory/2300-158-0x0000000000400000-0x0000000000423000-memory.dmp

              Filesize

              140KB

            • memory/2300-159-0x0000000000400000-0x0000000000421000-memory.dmp

              Filesize

              132KB

            • memory/2300-152-0x0000000000400000-0x0000000000423000-memory.dmp

              Filesize

              140KB

            • memory/2300-153-0x0000000000400000-0x0000000000423000-memory.dmp

              Filesize

              140KB