Analysis

  • max time kernel
    158s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 12:33

General

  • Target

    7b41f9b6d4792b89ad6b42e5baabadaed06d94a811e7b39183a03628173a9662.dll

  • Size

    285KB

  • MD5

    802eb9c45206347f84e6896869be3c28

  • SHA1

    d5ff8095cd4cd56accbac251604acfd085f040d1

  • SHA256

    7b41f9b6d4792b89ad6b42e5baabadaed06d94a811e7b39183a03628173a9662

  • SHA512

    7593d20acbaa8c9d10f6f49911039f97da768d7b8e6a5d51c5e786b0a245bd5959d4d930b723d5ba29e29226b06c7d4765ec3c60adf6e810f71168623d1babec

  • SSDEEP

    6144:65f4F+lY+NOttNIQ9jHC74RFVPNzQWSrwCgQ:614clY7ttNIGJNsJWQ

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7b41f9b6d4792b89ad6b42e5baabadaed06d94a811e7b39183a03628173a9662.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\7b41f9b6d4792b89ad6b42e5baabadaed06d94a811e7b39183a03628173a9662.dll
      2⤵
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Windows\SysWOW64\regsvr32mgr.exe
        C:\Windows\SysWOW64\regsvr32mgr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:4884
        • C:\Program Files (x86)\Microsoft\WaterMark.exe
          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:4692
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
              PID:4592
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 204
                6⤵
                • Program crash
                PID:3680
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4928
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4928 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:3676
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:5040
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5040 CREDAT:17410 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:4616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 4592 -ip 4592
      1⤵
        PID:3972

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        59KB

        MD5

        aea1462e5f1f31dd74df7833b5a07305

        SHA1

        cea53b9b3311f1003df5d9266f9e3fbd5c971f28

        SHA256

        62c957db467d22cf12af74a4dae478e7d239ecae5d53f3c6399583f38f5224af

        SHA512

        776eeffb068df67e852191f5ec869df6e4cb6c4f14dbe8748cf6b3f9aad2f3b09baa7c61285cb5a5f1253b5bd9525470a25ca77fbe2d26ed02ae7d955142970e

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        59KB

        MD5

        aea1462e5f1f31dd74df7833b5a07305

        SHA1

        cea53b9b3311f1003df5d9266f9e3fbd5c971f28

        SHA256

        62c957db467d22cf12af74a4dae478e7d239ecae5d53f3c6399583f38f5224af

        SHA512

        776eeffb068df67e852191f5ec869df6e4cb6c4f14dbe8748cf6b3f9aad2f3b09baa7c61285cb5a5f1253b5bd9525470a25ca77fbe2d26ed02ae7d955142970e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        7550b85aee4221c59808672005ed8855

        SHA1

        aeb269eff06f518132b9ecea824523fa125ba2d2

        SHA256

        2b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2

        SHA512

        216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        7550b85aee4221c59808672005ed8855

        SHA1

        aeb269eff06f518132b9ecea824523fa125ba2d2

        SHA256

        2b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2

        SHA512

        216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        d078862bb7f9eeebdcc23e4b5def1d15

        SHA1

        9a2633c9efe59fe9a1788af387c651dbaea49260

        SHA256

        098df52c926b6660f157504bbcaf7c4f809b1b6490b2985fa4f14b7cc4c9a54e

        SHA512

        fbeb466f60a63e61b20de945d58b8cd769191590345437b53fe5fad54b9cc54e0ae91918e13ce8d7e112d4d302b994c786b7bb891a005dd852e7f42608894a83

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        bae75ed4a63ee6c2fc7f068d1d7971c7

        SHA1

        1e2666eefa6470a582f8d4375f46fe680011a23c

        SHA256

        58cf85095155804318cdf058b9cf9d94796c7c83362f10a2c47e773f89addbc2

        SHA512

        5e1902ec094dd0e73443586add477b906d1001b66c5991b7c18fd6e146da900526eb8bad2c0590b2fa170914be6b1375be3dd0133e23e6aa46a4e84cda6dbccd

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{760CF0D7-51D0-11ED-89AC-DEF0885D2AEB}.dat

        Filesize

        5KB

        MD5

        3b1b021497a2826068bbe7615ad8086f

        SHA1

        e7a4a55e169c911d1b2b7f4cab0a1a76d32ff825

        SHA256

        12d0f4a18c61b52795dc6ab55ddba7f9ed695a98eabfa87b9c134e23b8451724

        SHA512

        f980264f35c02c863b59a0dd55b72a6e0d14c7aab5522906795d9abc61e4f46e9c4b6fee68890c83d0828158d6872a7f8feaf1c47d5f0da50b0987506a5f72a5

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{760F51D9-51D0-11ED-89AC-DEF0885D2AEB}.dat

        Filesize

        5KB

        MD5

        6926a8602a1ac7dd1baa7be89b65c0ab

        SHA1

        8c8689f651aeb61bd50b1d0cf1adf9bc27e8eefb

        SHA256

        ae7b1eb8f2b9d206c25463f13336ffb7df37955dfbbee5ec819ae0610c4b23da

        SHA512

        f6ef57f7e489eacddf66f528bec46e84af2f552629a7298a22b72a46ee8eaed95c2a23062c11f4b404344210770db638b8fdbd5bbccf6c5ff15d0c5d95fa5e68

      • C:\Windows\SysWOW64\regsvr32mgr.exe

        Filesize

        59KB

        MD5

        aea1462e5f1f31dd74df7833b5a07305

        SHA1

        cea53b9b3311f1003df5d9266f9e3fbd5c971f28

        SHA256

        62c957db467d22cf12af74a4dae478e7d239ecae5d53f3c6399583f38f5224af

        SHA512

        776eeffb068df67e852191f5ec869df6e4cb6c4f14dbe8748cf6b3f9aad2f3b09baa7c61285cb5a5f1253b5bd9525470a25ca77fbe2d26ed02ae7d955142970e

      • C:\Windows\SysWOW64\regsvr32mgr.exe

        Filesize

        59KB

        MD5

        aea1462e5f1f31dd74df7833b5a07305

        SHA1

        cea53b9b3311f1003df5d9266f9e3fbd5c971f28

        SHA256

        62c957db467d22cf12af74a4dae478e7d239ecae5d53f3c6399583f38f5224af

        SHA512

        776eeffb068df67e852191f5ec869df6e4cb6c4f14dbe8748cf6b3f9aad2f3b09baa7c61285cb5a5f1253b5bd9525470a25ca77fbe2d26ed02ae7d955142970e

      • memory/1912-133-0x0000000074E40000-0x0000000074E8E000-memory.dmp

        Filesize

        312KB

      • memory/4692-152-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4692-151-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4692-155-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4884-141-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4884-140-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4884-137-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4884-138-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4884-139-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB