Analysis

  • max time kernel
    116s
  • max time network
    183s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2022 00:23

General

  • Target

    f4c18aff463ce4a5268fad52ff41ccefb68dc3bef31bdfecc0016fa522135fa8.dll

  • Size

    475KB

  • MD5

    90ed8a1586dd00867e710aa3298d3e8b

  • SHA1

    0a0311c190144d8c73bc2428b6eb0cf31234ac7b

  • SHA256

    f4c18aff463ce4a5268fad52ff41ccefb68dc3bef31bdfecc0016fa522135fa8

  • SHA512

    ba9495f490ba895222fb9be07672efcd7f20cc906d93c9ee8b829520f58a86b162f3e75b2e459c200ca4dc7785ecece60209d0723250dd34e05d7609d2c330e7

  • SSDEEP

    12288:OTLUn/s4D5WVr8WkQUW7ccIZsmf586NSQth:OTLU/LD5W1/U4a5B8oSQt

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\f4c18aff463ce4a5268fad52ff41ccefb68dc3bef31bdfecc0016fa522135fa8.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\f4c18aff463ce4a5268fad52ff41ccefb68dc3bef31bdfecc0016fa522135fa8.dll
      2⤵
      • Adds Run key to start application
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1704
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1216 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HNWXGSL3.txt

    Filesize

    608B

    MD5

    9f42dc2b0a213506953d2cf40e234a54

    SHA1

    74f4793ee9ad17166b0c3cce6e8c2c77189ecd70

    SHA256

    c3da81356202520164e3608393379b2db58ce728932966743fe18a96699d7f94

    SHA512

    4d76478c4c053ec8e64ed5029b3d9a95999e99d4aa120244bddeff417e85dec6cb3f7f0216fc8737d69800652dd72a917f26633160eeadaa5d0e09fae390366c

  • memory/996-54-0x000007FEFBB41000-0x000007FEFBB43000-memory.dmp

    Filesize

    8KB

  • memory/1704-55-0x0000000000000000-mapping.dmp

  • memory/1704-56-0x00000000762D1000-0x00000000762D3000-memory.dmp

    Filesize

    8KB