Analysis

  • max time kernel
    96s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 06:45

General

  • Target

    fcfb0723033938cdb6814df1037fd67db6cfcbd3e326225934fdcdb1d391b89c.dll

  • Size

    67KB

  • MD5

    353bf673bd61d0d842c9e5aa51f6ac74

  • SHA1

    1d1b4ceb5c2a3c49eaf25612b62a01fa62384b21

  • SHA256

    fcfb0723033938cdb6814df1037fd67db6cfcbd3e326225934fdcdb1d391b89c

  • SHA512

    481a77b535ec63a13a88d441712d37fa8edfeba5d65017fdd6d178a68a2c9624a4c3bad32d7b4d9305b5f73b73d39dc2e979b6012f1203554f97b31c3a693072

  • SSDEEP

    1536:CwwLvKxcKphAxY+ZbWoQWyk0tU8EkCdVCxPJ2:WLiCJxYGu3ztCz

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fcfb0723033938cdb6814df1037fd67db6cfcbd3e326225934fdcdb1d391b89c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fcfb0723033938cdb6814df1037fd67db6cfcbd3e326225934fdcdb1d391b89c.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4844
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 836
        3⤵
        • Program crash
        PID:4208
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1092
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3600
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4844 -ip 4844
    1⤵
      PID:1204

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4844-133-0x00000000021C0000-0x00000000021F2000-memory.dmp

      Filesize

      200KB

    • memory/4844-134-0x00000000021C0000-0x00000000021F2000-memory.dmp

      Filesize

      200KB