Analysis

  • max time kernel
    145s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2022, 00:23

General

  • Target

    f4c18aff463ce4a5268fad52ff41ccefb68dc3bef31bdfecc0016fa522135fa8.dll

  • Size

    475KB

  • MD5

    90ed8a1586dd00867e710aa3298d3e8b

  • SHA1

    0a0311c190144d8c73bc2428b6eb0cf31234ac7b

  • SHA256

    f4c18aff463ce4a5268fad52ff41ccefb68dc3bef31bdfecc0016fa522135fa8

  • SHA512

    ba9495f490ba895222fb9be07672efcd7f20cc906d93c9ee8b829520f58a86b162f3e75b2e459c200ca4dc7785ecece60209d0723250dd34e05d7609d2c330e7

  • SSDEEP

    12288:OTLUn/s4D5WVr8WkQUW7ccIZsmf586NSQth:OTLU/LD5W1/U4a5B8oSQt

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\f4c18aff463ce4a5268fad52ff41ccefb68dc3bef31bdfecc0016fa522135fa8.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4236
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\f4c18aff463ce4a5268fad52ff41ccefb68dc3bef31bdfecc0016fa522135fa8.dll
      2⤵
      • Adds Run key to start application
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1920
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:256
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:228
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:228 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2628

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      deabbdcb221537d48aed54816739f367

      SHA1

      9ce0f0d21d9bd08823732047e19edbbd909396bc

      SHA256

      494de69d83714780f68a1e6871716f3a4a10835e90b4f96e48610c3e8f39e9cf

      SHA512

      95a80c34ddb83e74e51e5d0884dc7433de78b956db8fb2b1fb54e0f158283991edacafd3e7653161767a69f25f9cf537cc1a654d20e3f27bbc54588b3b4bf5e8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      2136c380977c6e2f76432c9460833824

      SHA1

      f8f8d9ee8a4e60b7341e98ce0f8677077bc47fee

      SHA256

      d1b5815a94d51c842c17cbc9356445dd28b69d4d00d9ad73b8f33bc1473f9aca

      SHA512

      ccc22d34cd23e8c1959b04459ecdccd6a2f57cb0417f857087725b7c1fffc1832ddb4b00251ac6445900ef657f767947047208d0efb9aa992b0ff96b9bbd581a