Analysis
-
max time kernel
152s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe
Resource
win10v2004-20220901-en
General
-
Target
00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe
-
Size
491KB
-
MD5
9328bb0c9aed5f33e2cac361d29e38b9
-
SHA1
425da152897083b83344c1a58d2edc8b5f22e7e0
-
SHA256
00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a
-
SHA512
310718beccf05a54f5b38686ddd7b7cbd8d2698702ab80e5284698b6d5d6994f55f8431f1a6af5ec8aea5aa9d27ebc52b4378c43c4c199f298a10f34d449ff2d
-
SSDEEP
12288:ejmxHgIlKAGD1++2gIbSmsIyV9i5yKSQcZ+L/hYxq:KmhgEQJ++WGVIi9i5hSNZ+DWq
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 22 1464 rundll32.exe -
Loads dropped DLL 6 IoCs
pid Process 4800 rundll32.exe 976 rundll32.exe 1464 rundll32.exe 2620 rundll32.exe 1788 rundll32.exe 4684 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AppDataLow Update = "rundll32 \"C:\\Users\\Admin\\AppData\\Local\\Adobe\\AdobeUpdate\\Adobeupdt32.DLL\",DllRegisterServer" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsTrayOnline = "rundll32.exe \"C:\\ProgramData\\WindowsTrayOnline.dll\",DllRegisterServer" rundll32.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1208F78D-F291-4204-8DBD-9A2767E6FB52} rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\XMLHTTP_UUID_Default = 8df7081291f204428dbd9a2767e6fb52 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" rundll32.exe -
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19 rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Aclpljangh\CLSID\ = "{5dbba30a-bfd3-4712-955e-bbddc22bdede}" rundll32.exe Key created \REGISTRY\USER\S-1-5-20\Software\Aclpljangh\CLSID rundll32.exe Key created \REGISTRY\USER\S-1-5-20\Software rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Aclpljangh\CLSID\ = "{5dbba30a-bfd3-4712-955e-bbddc22bdede}" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\Main\XMLHTTP_UUID_Default = 8df7081291f204428dbd9a2767e6fb52 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Aclpljangh\CLSID\ = "{5dbba30a-bfd3-4712-955e-bbddc22bdede}" rundll32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Aclpljangh\CLSID rundll32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Aclpljangh\CLSID rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Aclpljangh\CLSID rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Aclpljangh rundll32.exe Key created \REGISTRY\USER\S-1-5-19\Software\Aclpljangh\CLSID rundll32.exe Key created \REGISTRY\USER\S-1-5-19\Software rundll32.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Aclpljangh rundll32.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Aclpljangh rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\XMLHTTP_UUID_Default = 8df7081291f204428dbd9a2767e6fb52 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Internet Explorer\Main\XMLHTTP_UUID_Default = 8df7081291f204428dbd9a2767e6fb52 rundll32.exe Key created \REGISTRY\USER\.DEFAULT rundll32.exe Key created \REGISTRY\USER\S-1-5-20 rundll32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.fsharproj rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1208F78D-F291-4204-8DBD-9A2767E6FB52} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1208F78D-F291-4204-8DBD-9A2767E6FB52}\InprocServer32 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Software\Aclpljangh\CLSID rundll32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Software rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.fsharproj\PersistentHandler rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1208F78D-F291-4204-8DBD-9A2767E6FB52}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\InternetUser.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Aclpljangh rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Aclpljangh\CLSID\ = "{5dbba30a-bfd3-4712-955e-bbddc22bdede}" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Software\Aclpljangh rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Software\Aclpljangh\CLSID\ = "{5dbba30a-bfd3-4712-955e-bbddc22bdede}" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.fsharproj\PersistentHandler\ = "{2a8df8ad-4827-4213-bfb4-b4a0ae6aaef6}" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Aclpljangh\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5dbba30a-bfd3-4712-955e-bbddc22bdede} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1208F78D-F291-4204-8DBD-9A2767E6FB52}\InprocServer32\ThreadingModel = "Both" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1788 rundll32.exe 1788 rundll32.exe 2620 rundll32.exe 2620 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe 1788 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1464 rundll32.exe 1464 rundll32.exe 1464 rundll32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4800 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 84 PID 4792 wrote to memory of 4800 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 84 PID 4792 wrote to memory of 4800 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 84 PID 4792 wrote to memory of 976 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 85 PID 4792 wrote to memory of 976 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 85 PID 4792 wrote to memory of 976 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 85 PID 4792 wrote to memory of 1464 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 86 PID 4792 wrote to memory of 1464 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 86 PID 4792 wrote to memory of 1464 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 86 PID 4792 wrote to memory of 2620 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 87 PID 4792 wrote to memory of 2620 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 87 PID 4792 wrote to memory of 2620 4792 00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe 87 PID 4800 wrote to memory of 1788 4800 rundll32.exe 88 PID 4800 wrote to memory of 1788 4800 rundll32.exe 88 PID 4800 wrote to memory of 1788 4800 rundll32.exe 88 PID 1788 wrote to memory of 4684 1788 rundll32.exe 89 PID 1788 wrote to memory of 4684 1788 rundll32.exe 89 PID 1788 wrote to memory of 4684 1788 rundll32.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe"C:\Users\Admin\AppData\Local\Temp\00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\BFAB.tmp",DllRegisterServer2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\WindowsTrayOnline.dll",DllRegisterServer3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\WindowsTrayOnline.dll",DllRegisterServer4⤵
- Loads dropped DLL
PID:4684
-
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Adobe\AdobeUpdate\Adobeupdt32",DllUnregisterServer2⤵
- Loads dropped DLL
- Adds Run key to start application
PID:976
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Adobe\AdobeUpdate\Adobeupdt32",DllRegisterServer2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1464
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\InternetUser.dll",DllRegisterServer2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5e44c5441717f8025910f409f00f0c654
SHA1f2069b82893821adee5a13a83646fa14aae99914
SHA256708557df71d4453523ce0d7b3a9e66d994b017e8d5521f7065e1a6868e0e599e
SHA5125ddb3bcbef415d8800866d337c35738ca843393ff6e04d63a219c6d8781c781caca2def25bdf25b5636001eed5bc54024f155c091caf1d830c3ae8e1e4c16694
-
Filesize
88KB
MD5e44c5441717f8025910f409f00f0c654
SHA1f2069b82893821adee5a13a83646fa14aae99914
SHA256708557df71d4453523ce0d7b3a9e66d994b017e8d5521f7065e1a6868e0e599e
SHA5125ddb3bcbef415d8800866d337c35738ca843393ff6e04d63a219c6d8781c781caca2def25bdf25b5636001eed5bc54024f155c091caf1d830c3ae8e1e4c16694
-
Filesize
88KB
MD5e44c5441717f8025910f409f00f0c654
SHA1f2069b82893821adee5a13a83646fa14aae99914
SHA256708557df71d4453523ce0d7b3a9e66d994b017e8d5521f7065e1a6868e0e599e
SHA5125ddb3bcbef415d8800866d337c35738ca843393ff6e04d63a219c6d8781c781caca2def25bdf25b5636001eed5bc54024f155c091caf1d830c3ae8e1e4c16694
-
Filesize
119KB
MD5e4fcc70025e12ea341cf19a0cec78ae8
SHA1301ebe30966717ddc8e93401ce83cb8d0b4a8799
SHA2567a27461a201f36699e70f19086e7b0f6315b48767704a59d25a5ec4bf603e2a1
SHA51284901cf693f3b0b266a4e43a9ee7048af22cc1269b7ec5af4cf4785f0d0c940ac12b259872388fabcea23a902681f66098aaf396c03a64c4e3694f2da5003dc1
-
Filesize
119KB
MD5e4fcc70025e12ea341cf19a0cec78ae8
SHA1301ebe30966717ddc8e93401ce83cb8d0b4a8799
SHA2567a27461a201f36699e70f19086e7b0f6315b48767704a59d25a5ec4bf603e2a1
SHA51284901cf693f3b0b266a4e43a9ee7048af22cc1269b7ec5af4cf4785f0d0c940ac12b259872388fabcea23a902681f66098aaf396c03a64c4e3694f2da5003dc1
-
Filesize
119KB
MD5e4fcc70025e12ea341cf19a0cec78ae8
SHA1301ebe30966717ddc8e93401ce83cb8d0b4a8799
SHA2567a27461a201f36699e70f19086e7b0f6315b48767704a59d25a5ec4bf603e2a1
SHA51284901cf693f3b0b266a4e43a9ee7048af22cc1269b7ec5af4cf4785f0d0c940ac12b259872388fabcea23a902681f66098aaf396c03a64c4e3694f2da5003dc1
-
Filesize
254KB
MD56a666d0a2a546c3ee3e8837c93545841
SHA1ee1e9344117dfcdcdc6044eca749f22d9c10b65e
SHA256fdefb60368ef315f2038dc5b52554fdd621da0e11cbfd4b169a60a8961cb14a9
SHA5128e41f03f86af16e32667ede02e6ff4e0031e32404864a15dac7167e2fc08dc3377d09e3d25475f0fb330dc6ce338eb2ebf828309f8a78a3252db8a756a458ed1
-
Filesize
254KB
MD56a666d0a2a546c3ee3e8837c93545841
SHA1ee1e9344117dfcdcdc6044eca749f22d9c10b65e
SHA256fdefb60368ef315f2038dc5b52554fdd621da0e11cbfd4b169a60a8961cb14a9
SHA5128e41f03f86af16e32667ede02e6ff4e0031e32404864a15dac7167e2fc08dc3377d09e3d25475f0fb330dc6ce338eb2ebf828309f8a78a3252db8a756a458ed1
-
Filesize
88KB
MD5e44c5441717f8025910f409f00f0c654
SHA1f2069b82893821adee5a13a83646fa14aae99914
SHA256708557df71d4453523ce0d7b3a9e66d994b017e8d5521f7065e1a6868e0e599e
SHA5125ddb3bcbef415d8800866d337c35738ca843393ff6e04d63a219c6d8781c781caca2def25bdf25b5636001eed5bc54024f155c091caf1d830c3ae8e1e4c16694
-
Filesize
88KB
MD5e44c5441717f8025910f409f00f0c654
SHA1f2069b82893821adee5a13a83646fa14aae99914
SHA256708557df71d4453523ce0d7b3a9e66d994b017e8d5521f7065e1a6868e0e599e
SHA5125ddb3bcbef415d8800866d337c35738ca843393ff6e04d63a219c6d8781c781caca2def25bdf25b5636001eed5bc54024f155c091caf1d830c3ae8e1e4c16694