Analysis

  • max time kernel
    147s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 12:40

General

  • Target

    80184d0312cbe2ff939f9ac6ce1ebb9232e7bbe5f1908943a8166a5a63d2c1cb.dll

  • Size

    449KB

  • MD5

    a294431f250926bb2303d1a6405ab273

  • SHA1

    1a10bc171ad36fe1e371462617d30dd83cea08e4

  • SHA256

    80184d0312cbe2ff939f9ac6ce1ebb9232e7bbe5f1908943a8166a5a63d2c1cb

  • SHA512

    dd6039b1dbb87ed892da66568ac609d2c1c2e7bb74b3a0ca4fe483e608ff07f4eca4f0e7679bee8eedad50bfb41a2a17f002418f5fb0767083c77b9861c8633b

  • SSDEEP

    6144:QdUT++McaeVKEbwZWeTfKnMVWpftaagWvmVJUt0A/7Dz623Yh/loxCRdgMEt1i/v:++MXeV1UWqKMeftaC6UdYZJ721iLNN

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\80184d0312cbe2ff939f9ac6ce1ebb9232e7bbe5f1908943a8166a5a63d2c1cb.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\80184d0312cbe2ff939f9ac6ce1ebb9232e7bbe5f1908943a8166a5a63d2c1cb.dll,#1
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:1112
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:784 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1740
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:784 CREDAT:275461 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\I1FM6S9A.txt

    Filesize

    603B

    MD5

    6e71d71ed1bb84551152f6740de0e424

    SHA1

    71a72421700bace7025c4dbbcfd2ff521ead8fda

    SHA256

    cf6875cfc8fecafe185b5c9d9c77a9e52c85dba03aa1a33c13a9de036daa80d9

    SHA512

    908360f8ed02d4c55ab7ab1ea80f8a7ac8ca4b466e96029d9e701c6f8ebaadf547f93d1781d1fcc35c45e8db0c147c5a8d8e257760e01f414afe2bbc2ac03f67

  • memory/1112-54-0x0000000000000000-mapping.dmp

  • memory/1112-55-0x0000000075B11000-0x0000000075B13000-memory.dmp

    Filesize

    8KB

  • memory/1112-56-0x0000000000340000-0x00000000003B3000-memory.dmp

    Filesize

    460KB

  • memory/1112-60-0x0000000000250000-0x00000000002B3000-memory.dmp

    Filesize

    396KB