Analysis

  • max time kernel
    152s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 13:40

General

  • Target

    00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe

  • Size

    491KB

  • MD5

    9328bb0c9aed5f33e2cac361d29e38b9

  • SHA1

    425da152897083b83344c1a58d2edc8b5f22e7e0

  • SHA256

    00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a

  • SHA512

    310718beccf05a54f5b38686ddd7b7cbd8d2698702ab80e5284698b6d5d6994f55f8431f1a6af5ec8aea5aa9d27ebc52b4378c43c4c199f298a10f34d449ff2d

  • SSDEEP

    12288:ejmxHgIlKAGD1++2gIbSmsIyV9i5yKSQcZ+L/hYxq:KmhgEQJ++WGVIi9i5hSNZ+DWq

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 20 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe
    "C:\Users\Admin\AppData\Local\Temp\00ce14c3c67c2f85e1120dd9f5abf50a0d41e72aa31f616fe3c9d1cd8666545a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\BFAB.tmp",DllRegisterServer
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\ProgramData\WindowsTrayOnline.dll",DllRegisterServer
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1788
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe "C:\ProgramData\WindowsTrayOnline.dll",DllRegisterServer
          4⤵
          • Loads dropped DLL
          PID:4684
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Adobe\AdobeUpdate\Adobeupdt32",DllUnregisterServer
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      PID:976
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Adobe\AdobeUpdate\Adobeupdt32",DllRegisterServer
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1464
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\InternetUser.dll",DllRegisterServer
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\WindowsTrayOnline.dll

    Filesize

    88KB

    MD5

    e44c5441717f8025910f409f00f0c654

    SHA1

    f2069b82893821adee5a13a83646fa14aae99914

    SHA256

    708557df71d4453523ce0d7b3a9e66d994b017e8d5521f7065e1a6868e0e599e

    SHA512

    5ddb3bcbef415d8800866d337c35738ca843393ff6e04d63a219c6d8781c781caca2def25bdf25b5636001eed5bc54024f155c091caf1d830c3ae8e1e4c16694

  • C:\ProgramData\WindowsTrayOnline.dll

    Filesize

    88KB

    MD5

    e44c5441717f8025910f409f00f0c654

    SHA1

    f2069b82893821adee5a13a83646fa14aae99914

    SHA256

    708557df71d4453523ce0d7b3a9e66d994b017e8d5521f7065e1a6868e0e599e

    SHA512

    5ddb3bcbef415d8800866d337c35738ca843393ff6e04d63a219c6d8781c781caca2def25bdf25b5636001eed5bc54024f155c091caf1d830c3ae8e1e4c16694

  • C:\ProgramData\WindowsTrayOnline.dll

    Filesize

    88KB

    MD5

    e44c5441717f8025910f409f00f0c654

    SHA1

    f2069b82893821adee5a13a83646fa14aae99914

    SHA256

    708557df71d4453523ce0d7b3a9e66d994b017e8d5521f7065e1a6868e0e599e

    SHA512

    5ddb3bcbef415d8800866d337c35738ca843393ff6e04d63a219c6d8781c781caca2def25bdf25b5636001eed5bc54024f155c091caf1d830c3ae8e1e4c16694

  • C:\Users\Admin\AppData\Local\Adobe\AdobeUpdate\Adobeupdt32.DLL

    Filesize

    119KB

    MD5

    e4fcc70025e12ea341cf19a0cec78ae8

    SHA1

    301ebe30966717ddc8e93401ce83cb8d0b4a8799

    SHA256

    7a27461a201f36699e70f19086e7b0f6315b48767704a59d25a5ec4bf603e2a1

    SHA512

    84901cf693f3b0b266a4e43a9ee7048af22cc1269b7ec5af4cf4785f0d0c940ac12b259872388fabcea23a902681f66098aaf396c03a64c4e3694f2da5003dc1

  • C:\Users\Admin\AppData\Local\Adobe\AdobeUpdate\Adobeupdt32.dll

    Filesize

    119KB

    MD5

    e4fcc70025e12ea341cf19a0cec78ae8

    SHA1

    301ebe30966717ddc8e93401ce83cb8d0b4a8799

    SHA256

    7a27461a201f36699e70f19086e7b0f6315b48767704a59d25a5ec4bf603e2a1

    SHA512

    84901cf693f3b0b266a4e43a9ee7048af22cc1269b7ec5af4cf4785f0d0c940ac12b259872388fabcea23a902681f66098aaf396c03a64c4e3694f2da5003dc1

  • C:\Users\Admin\AppData\Local\Adobe\AdobeUpdate\Adobeupdt32.dll

    Filesize

    119KB

    MD5

    e4fcc70025e12ea341cf19a0cec78ae8

    SHA1

    301ebe30966717ddc8e93401ce83cb8d0b4a8799

    SHA256

    7a27461a201f36699e70f19086e7b0f6315b48767704a59d25a5ec4bf603e2a1

    SHA512

    84901cf693f3b0b266a4e43a9ee7048af22cc1269b7ec5af4cf4785f0d0c940ac12b259872388fabcea23a902681f66098aaf396c03a64c4e3694f2da5003dc1

  • C:\Users\Admin\AppData\Local\InternetUser.dll

    Filesize

    254KB

    MD5

    6a666d0a2a546c3ee3e8837c93545841

    SHA1

    ee1e9344117dfcdcdc6044eca749f22d9c10b65e

    SHA256

    fdefb60368ef315f2038dc5b52554fdd621da0e11cbfd4b169a60a8961cb14a9

    SHA512

    8e41f03f86af16e32667ede02e6ff4e0031e32404864a15dac7167e2fc08dc3377d09e3d25475f0fb330dc6ce338eb2ebf828309f8a78a3252db8a756a458ed1

  • C:\Users\Admin\AppData\Local\InternetUser.dll

    Filesize

    254KB

    MD5

    6a666d0a2a546c3ee3e8837c93545841

    SHA1

    ee1e9344117dfcdcdc6044eca749f22d9c10b65e

    SHA256

    fdefb60368ef315f2038dc5b52554fdd621da0e11cbfd4b169a60a8961cb14a9

    SHA512

    8e41f03f86af16e32667ede02e6ff4e0031e32404864a15dac7167e2fc08dc3377d09e3d25475f0fb330dc6ce338eb2ebf828309f8a78a3252db8a756a458ed1

  • C:\Users\Admin\AppData\Local\Temp\BFAB.tmp

    Filesize

    88KB

    MD5

    e44c5441717f8025910f409f00f0c654

    SHA1

    f2069b82893821adee5a13a83646fa14aae99914

    SHA256

    708557df71d4453523ce0d7b3a9e66d994b017e8d5521f7065e1a6868e0e599e

    SHA512

    5ddb3bcbef415d8800866d337c35738ca843393ff6e04d63a219c6d8781c781caca2def25bdf25b5636001eed5bc54024f155c091caf1d830c3ae8e1e4c16694

  • C:\Users\Admin\AppData\Local\Temp\BFAB.tmp

    Filesize

    88KB

    MD5

    e44c5441717f8025910f409f00f0c654

    SHA1

    f2069b82893821adee5a13a83646fa14aae99914

    SHA256

    708557df71d4453523ce0d7b3a9e66d994b017e8d5521f7065e1a6868e0e599e

    SHA512

    5ddb3bcbef415d8800866d337c35738ca843393ff6e04d63a219c6d8781c781caca2def25bdf25b5636001eed5bc54024f155c091caf1d830c3ae8e1e4c16694

  • memory/976-146-0x0000000010000000-0x0000000010068000-memory.dmp

    Filesize

    416KB

  • memory/1464-171-0x0000000073C20000-0x0000000074070000-memory.dmp

    Filesize

    4.3MB

  • memory/1464-165-0x0000000073C20000-0x0000000074070000-memory.dmp

    Filesize

    4.3MB

  • memory/1464-184-0x0000000010000000-0x0000000010068000-memory.dmp

    Filesize

    416KB

  • memory/1464-147-0x0000000010000000-0x0000000010068000-memory.dmp

    Filesize

    416KB

  • memory/1464-183-0x00000000027A6000-0x00000000027E0000-memory.dmp

    Filesize

    232KB

  • memory/1464-181-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-182-0x0000000074410000-0x000000007444A000-memory.dmp

    Filesize

    232KB

  • memory/1464-180-0x0000000074410000-0x000000007444A000-memory.dmp

    Filesize

    232KB

  • memory/1464-179-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-154-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-155-0x0000000073C20000-0x0000000074070000-memory.dmp

    Filesize

    4.3MB

  • memory/1464-157-0x0000000073C20000-0x0000000074070000-memory.dmp

    Filesize

    4.3MB

  • memory/1464-158-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-156-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-159-0x0000000073C20000-0x0000000074070000-memory.dmp

    Filesize

    4.3MB

  • memory/1464-160-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-161-0x0000000073C20000-0x0000000074070000-memory.dmp

    Filesize

    4.3MB

  • memory/1464-162-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-178-0x0000000073C20000-0x0000000074070000-memory.dmp

    Filesize

    4.3MB

  • memory/1464-177-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-176-0x0000000073C20000-0x0000000074070000-memory.dmp

    Filesize

    4.3MB

  • memory/1464-166-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-167-0x0000000073C20000-0x0000000074070000-memory.dmp

    Filesize

    4.3MB

  • memory/1464-168-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-169-0x0000000073C20000-0x0000000074070000-memory.dmp

    Filesize

    4.3MB

  • memory/1464-170-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-175-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-173-0x0000000002760000-0x00000000027E0000-memory.dmp

    Filesize

    512KB

  • memory/1464-174-0x0000000073C20000-0x0000000074070000-memory.dmp

    Filesize

    4.3MB

  • memory/1788-163-0x0000000010000000-0x0000000010040000-memory.dmp

    Filesize

    256KB

  • memory/2620-148-0x0000000010000000-0x0000000010118000-memory.dmp

    Filesize

    1.1MB

  • memory/4684-164-0x0000000010000000-0x0000000010040000-memory.dmp

    Filesize

    256KB

  • memory/4792-172-0x00000000023B0000-0x000000000242A000-memory.dmp

    Filesize

    488KB

  • memory/4792-144-0x00000000023B0000-0x000000000242A000-memory.dmp

    Filesize

    488KB

  • memory/4792-143-0x0000000000580000-0x0000000000684000-memory.dmp

    Filesize

    1.0MB

  • memory/4800-145-0x0000000010000000-0x0000000010040000-memory.dmp

    Filesize

    256KB