Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8.dll
Resource
win10v2004-20220812-en
General
-
Target
18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8.dll
-
Size
460KB
-
MD5
beae4d36b224b8a1ee61e4f9dc4151cf
-
SHA1
2780fc238cd0eb2d10eefa8bb639f6c589123984
-
SHA256
18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8
-
SHA512
ae80e3a12379de68707f7f60c653af8ea73910d259cd326c5ef2b118f441c7604016786c7dbdbb26f5ab2ca68998c8f3389354e07eee90539e323902fccd5a9e
-
SSDEEP
6144:uyolGpyTm5X7UKCns9rsKGLNW1opnmavXwlkJBgl0GQOeHvCpnVVjX7WKMYuEmw:ul4yMvINxMiFvwl03FHETjX7MY5mw
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8 = "rundll32.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8.dll,#1" rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30993326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373823722" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30993326" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2276296948" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{ACABFE3B-57A1-11ED-AECB-E62BBF623C53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2175203836" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2175046621" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2206921788" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30993326" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30993326" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4708 iexplore.exe 4708 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4708 iexplore.exe 4708 iexplore.exe 3252 IEXPLORE.EXE 3252 IEXPLORE.EXE 1044 rundll32.exe 4708 iexplore.exe 4708 iexplore.exe 4204 IEXPLORE.EXE 4204 IEXPLORE.EXE 1044 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4244 wrote to memory of 1044 4244 rundll32.exe 78 PID 4244 wrote to memory of 1044 4244 rundll32.exe 78 PID 4244 wrote to memory of 1044 4244 rundll32.exe 78 PID 4708 wrote to memory of 3252 4708 iexplore.exe 81 PID 4708 wrote to memory of 3252 4708 iexplore.exe 81 PID 4708 wrote to memory of 3252 4708 iexplore.exe 81 PID 4708 wrote to memory of 4204 4708 iexplore.exe 87 PID 4708 wrote to memory of 4204 4708 iexplore.exe 87 PID 4708 wrote to memory of 4204 4708 iexplore.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\18fde4891144408616c44453363523a5bc6a15c53d3bc110495ba63cd953d6c8.dll,#12⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:1588
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4708 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3252
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4708 CREDAT:82948 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4204
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a66314123c8c72372bcb8583a5400a95
SHA1fc3e45060463c37775da0bd4a8920296d222753d
SHA256657c92d95798fc5dad4272f3d6d71776737ac0bcdce4ac6864ca5532f2ccf34d
SHA512d9f5c243b04d7b3fbbcb37c68c583db672390644500cfa4d58280048d9fde52c668fd67e84ecd6ace20b2813eefb756627adbd04a6f19719f6e907aa3fffe4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5317e5c16d4e3d8c8346b8e6ed01264b6
SHA1ef28f969875d03aeef888ec4a9cb577a43308a0c
SHA25659a7a4bf49c2400c1adac26e2f43ba7c2b239f77b05440f0915fa47730ded083
SHA5121e1cc43f388852f2592003c7a9918e4406f2a9243007982da43ed452da2f945100347435db56b164b5f6e848e915f8d950ea42d6fb08c2f289b60fdfff9f90f7