Analysis
-
max time kernel
139s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
46d733e1a3a2876e299decf76fd498d66d57d1b49f36dfab706eb0a3fed9ac04.dll
Resource
win7-20220812-en
General
-
Target
46d733e1a3a2876e299decf76fd498d66d57d1b49f36dfab706eb0a3fed9ac04.dll
-
Size
717KB
-
MD5
a183bc04453d9947a72914a589f06170
-
SHA1
e46461c730a8630978cff731c7cc473b9a122f00
-
SHA256
46d733e1a3a2876e299decf76fd498d66d57d1b49f36dfab706eb0a3fed9ac04
-
SHA512
e6791d2da44f023b25f9f2a357a7c76b0c59cb4e6e1247f3efdd2ced2d36a87a87c7c472302dd860a154e087ad57083a3feea6d5368da7415edeac8de08643c0
-
SSDEEP
12288:gzb9rMfc+CKUQyUmjtc4euuzPrs9pGp8hunWoopooK9kwPZoP:gzb1MlCKUQyUmjtczu6Prs9pgWoopooh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4868 rundll32Srv.exe 4356 DesktopLayer.exe -
resource yara_rule behavioral2/files/0x000a000000022e3e-135.dat upx behavioral2/files/0x000a000000022e3e-134.dat upx behavioral2/files/0x0007000000022e43-137.dat upx behavioral2/files/0x0007000000022e43-138.dat upx behavioral2/memory/4868-139-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/4356-140-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxF8AD.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3110248936" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3110248936" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30993752" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E00BD929-594B-11ED-89AC-72E07057041D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30993752" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3083844426" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3083844426" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30993752" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374006785" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30993752" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4356 DesktopLayer.exe 4356 DesktopLayer.exe 4356 DesktopLayer.exe 4356 DesktopLayer.exe 4356 DesktopLayer.exe 4356 DesktopLayer.exe 4356 DesktopLayer.exe 4356 DesktopLayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 756 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 756 iexplore.exe 756 iexplore.exe 3176 IEXPLORE.EXE 3176 IEXPLORE.EXE 3176 IEXPLORE.EXE 3176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4968 4928 rundll32.exe 81 PID 4928 wrote to memory of 4968 4928 rundll32.exe 81 PID 4928 wrote to memory of 4968 4928 rundll32.exe 81 PID 4968 wrote to memory of 4868 4968 rundll32.exe 82 PID 4968 wrote to memory of 4868 4968 rundll32.exe 82 PID 4968 wrote to memory of 4868 4968 rundll32.exe 82 PID 4868 wrote to memory of 4356 4868 rundll32Srv.exe 84 PID 4868 wrote to memory of 4356 4868 rundll32Srv.exe 84 PID 4868 wrote to memory of 4356 4868 rundll32Srv.exe 84 PID 4356 wrote to memory of 756 4356 DesktopLayer.exe 86 PID 4356 wrote to memory of 756 4356 DesktopLayer.exe 86 PID 756 wrote to memory of 3176 756 iexplore.exe 87 PID 756 wrote to memory of 3176 756 iexplore.exe 87 PID 756 wrote to memory of 3176 756 iexplore.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46d733e1a3a2876e299decf76fd498d66d57d1b49f36dfab706eb0a3fed9ac04.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46d733e1a3a2876e299decf76fd498d66d57d1b49f36dfab706eb0a3fed9ac04.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3176
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD53a559adda0a4483b1138c8f50fe28707
SHA17ecc8a51a9e9864eb5317cd9fbf5038f50cdb08d
SHA256f3d6e8b0a74ee958c24cdc3ef529dd24be7fd58ce0d26e443bdca5cf52b357c8
SHA512fc7bc63f472f02f7a233b93d5986163581e9abf4272c831f4383c77008831aaf48b2ed16951781cadb7cf2d45f5246c74b9e2b15ae24bbae2cdea3de97d7a605
-
Filesize
59KB
MD53a559adda0a4483b1138c8f50fe28707
SHA17ecc8a51a9e9864eb5317cd9fbf5038f50cdb08d
SHA256f3d6e8b0a74ee958c24cdc3ef529dd24be7fd58ce0d26e443bdca5cf52b357c8
SHA512fc7bc63f472f02f7a233b93d5986163581e9abf4272c831f4383c77008831aaf48b2ed16951781cadb7cf2d45f5246c74b9e2b15ae24bbae2cdea3de97d7a605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5deabbdcb221537d48aed54816739f367
SHA19ce0f0d21d9bd08823732047e19edbbd909396bc
SHA256494de69d83714780f68a1e6871716f3a4a10835e90b4f96e48610c3e8f39e9cf
SHA51295a80c34ddb83e74e51e5d0884dc7433de78b956db8fb2b1fb54e0f158283991edacafd3e7653161767a69f25f9cf537cc1a654d20e3f27bbc54588b3b4bf5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD593a2feba4b4c3fe5308a757b9b1e27a0
SHA1094b5def2c1a80743eee9e7537683152ee29b2e7
SHA256a1d87098543b88fccfc7538026716d708de88194249b6612ec0d101b1cf43443
SHA5120321aefbb3d1dcef09f008c1dfa3f7a52a99274022efc0bf885ac0150757ec2be21f4e375376c277e47b2727550954fa062ee2ad904d2d0dbb0754d7b4a5b135
-
Filesize
59KB
MD53a559adda0a4483b1138c8f50fe28707
SHA17ecc8a51a9e9864eb5317cd9fbf5038f50cdb08d
SHA256f3d6e8b0a74ee958c24cdc3ef529dd24be7fd58ce0d26e443bdca5cf52b357c8
SHA512fc7bc63f472f02f7a233b93d5986163581e9abf4272c831f4383c77008831aaf48b2ed16951781cadb7cf2d45f5246c74b9e2b15ae24bbae2cdea3de97d7a605
-
Filesize
59KB
MD53a559adda0a4483b1138c8f50fe28707
SHA17ecc8a51a9e9864eb5317cd9fbf5038f50cdb08d
SHA256f3d6e8b0a74ee958c24cdc3ef529dd24be7fd58ce0d26e443bdca5cf52b357c8
SHA512fc7bc63f472f02f7a233b93d5986163581e9abf4272c831f4383c77008831aaf48b2ed16951781cadb7cf2d45f5246c74b9e2b15ae24bbae2cdea3de97d7a605