Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 08:54
Static task
static1
Behavioral task
behavioral1
Sample
51da274016724d3654dfb5cd5b202a73a8c31cb19aaf254568e56747337fca50.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
51da274016724d3654dfb5cd5b202a73a8c31cb19aaf254568e56747337fca50.dll
Resource
win10v2004-20220812-en
General
-
Target
51da274016724d3654dfb5cd5b202a73a8c31cb19aaf254568e56747337fca50.dll
-
Size
220KB
-
MD5
120a38ec5fd75385e14bd68cc28b3ed0
-
SHA1
9e2df88945805a10d4e317a4670021d53c02be0a
-
SHA256
51da274016724d3654dfb5cd5b202a73a8c31cb19aaf254568e56747337fca50
-
SHA512
11167bdb425c0146cf296ea9917a225f860bbb3c9e48f4f807ae0fdc827f283f9b7fe8565a739765b04ce096bf0136d6b789e19b6c269c29d4f792aa8972fb73
-
SSDEEP
3072:bx80xX2aL6pDXcyISI+TzOFeITQryMyHcMAfA2y24OXEDXc4PMbuAcKwsWf:bxpX16bIHFtgKAfA3jO0DXcDbu5bf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\51da274016724d3654dfb5cd5b202a73a8c31cb19aaf254568e56747337fca50 = "regsvr32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\51da274016724d3654dfb5cd5b202a73a8c31cb19aaf254568e56747337fca50.dll\"" Explorer.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 4932 3260 WerFault.exe 48 -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" Explorer.EXE -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" Explorer.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\TabProcGrowth = "0" Explorer.EXE -
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{199E6FCE-3E75-45C5-A138-3930370D6E0F} sihost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{736309C0-2F56-497F-8B75-40B56A44218D} sihost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{199E6FCE-3E75-45C5-A138-3930370D6E0F} taskhostw.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{199E6FCE-3E75-45C5-A138-3930370D6E0F} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{199E6FCE-3E75-45C5-A138-3930370D6E0F} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{199E6FCE-3E75-45C5-A138-3930370D6E0F} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{736309C0-2F56-497F-8B75-40B56A44218D}\{2FFF3732-5BAF-4AE8-8663-1AF020FC79AA} = 02ea296e sihost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{199E6FCE-3E75-45C5-A138-3930370D6E0F} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{736309C0-2F56-497F-8B75-40B56A44218D} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{199E6FCE-3E75-45C5-A138-3930370D6E0F}\#cert = 31 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{00261E27-52F6-4985-A297-2E1520AD7E1D} StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{199E6FCE-3E75-45C5-A138-3930370D6E0F} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{736309C0-2F56-497F-8B75-40B56A44218D} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{736309C0-2F56-497F-8B75-40B56A44218D} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{736309C0-2F56-497F-8B75-40B56A44218D} RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{199E6FCE-3E75-45C5-A138-3930370D6E0F} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{736309C0-2F56-497F-8B75-40B56A44218D} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\WOW6432Node\CLSID\{736309C0-2F56-497F-8B75-40B56A44218D}\{2FFF3732-5BAF-4AE8-8663-1AF020FC79AA} = 02ea296e rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{736309C0-2F56-497F-8B75-40B56A44218D} taskhostw.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{736309C0-2F56-497F-8B75-40B56A44218D} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID\{4819052B-70D1-48C0-A5FD-7E16098E024E} StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\CLSID StartMenuExperienceHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1424 rundll32.exe 1424 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3044 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeCreateGlobalPrivilege 2332 sihost.exe Token: SeShutdownPrivilege 2332 sihost.exe Token: SeDebugPrivilege 2332 sihost.exe Token: SeCreateGlobalPrivilege 2440 taskhostw.exe Token: SeShutdownPrivilege 2440 taskhostw.exe Token: SeDebugPrivilege 2440 taskhostw.exe Token: SeCreateGlobalPrivilege 3044 Explorer.EXE Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeDebugPrivilege 3044 Explorer.EXE Token: SeCreateGlobalPrivilege 3356 StartMenuExperienceHost.exe Token: SeShutdownPrivilege 3356 StartMenuExperienceHost.exe Token: SeDebugPrivilege 3356 StartMenuExperienceHost.exe Token: SeCreateGlobalPrivilege 3420 RuntimeBroker.exe Token: SeShutdownPrivilege 3420 RuntimeBroker.exe Token: SeDebugPrivilege 3420 RuntimeBroker.exe Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeCreatePagefilePrivilege 3044 Explorer.EXE Token: SeCreateGlobalPrivilege 3732 RuntimeBroker.exe Token: SeShutdownPrivilege 3732 RuntimeBroker.exe Token: SeDebugPrivilege 3732 RuntimeBroker.exe Token: SeCreateGlobalPrivilege 4688 RuntimeBroker.exe Token: SeShutdownPrivilege 4688 RuntimeBroker.exe Token: SeDebugPrivilege 4688 RuntimeBroker.exe Token: SeCreateGlobalPrivilege 4084 rundll32.exe Token: SeShutdownPrivilege 4084 rundll32.exe Token: SeDebugPrivilege 4084 rundll32.exe Token: SeCreateGlobalPrivilege 1424 rundll32.exe Token: SeShutdownPrivilege 1424 rundll32.exe Token: SeDebugPrivilege 1424 rundll32.exe Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeCreatePagefilePrivilege 3044 Explorer.EXE Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeCreatePagefilePrivilege 3044 Explorer.EXE Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeCreatePagefilePrivilege 3044 Explorer.EXE Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeCreatePagefilePrivilege 3044 Explorer.EXE Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeCreatePagefilePrivilege 3044 Explorer.EXE Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeCreatePagefilePrivilege 3044 Explorer.EXE Token: SeShutdownPrivilege 3044 Explorer.EXE Token: SeCreatePagefilePrivilege 3044 Explorer.EXE Token: SeShutdownPrivilege 3420 RuntimeBroker.exe Token: SeShutdownPrivilege 3420 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4084 wrote to memory of 1424 4084 rundll32.exe 79 PID 4084 wrote to memory of 1424 4084 rundll32.exe 79 PID 4084 wrote to memory of 1424 4084 rundll32.exe 79 PID 1424 wrote to memory of 2332 1424 rundll32.exe 23 PID 1424 wrote to memory of 2332 1424 rundll32.exe 23 PID 1424 wrote to memory of 2440 1424 rundll32.exe 57 PID 1424 wrote to memory of 2440 1424 rundll32.exe 57 PID 1424 wrote to memory of 3044 1424 rundll32.exe 50 PID 1424 wrote to memory of 3044 1424 rundll32.exe 50 PID 1424 wrote to memory of 3260 1424 rundll32.exe 48 PID 1424 wrote to memory of 3260 1424 rundll32.exe 48 PID 1424 wrote to memory of 3356 1424 rundll32.exe 28 PID 1424 wrote to memory of 3356 1424 rundll32.exe 28 PID 1424 wrote to memory of 3420 1424 rundll32.exe 27 PID 1424 wrote to memory of 3420 1424 rundll32.exe 27 PID 1424 wrote to memory of 3516 1424 rundll32.exe 47 PID 1424 wrote to memory of 3516 1424 rundll32.exe 47 PID 1424 wrote to memory of 3732 1424 rundll32.exe 46 PID 1424 wrote to memory of 3732 1424 rundll32.exe 46 PID 1424 wrote to memory of 4688 1424 rundll32.exe 44 PID 1424 wrote to memory of 4688 1424 rundll32.exe 44 PID 1424 wrote to memory of 4084 1424 rundll32.exe 78 PID 1424 wrote to memory of 4084 1424 rundll32.exe 78
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3516
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3260
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3260 -s 3962⤵
- Program crash
PID:4932
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\51da274016724d3654dfb5cd5b202a73a8c31cb19aaf254568e56747337fca50.dll,#12⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\51da274016724d3654dfb5cd5b202a73a8c31cb19aaf254568e56747337fca50.dll,#13⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1424
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 440 -p 3260 -ip 32601⤵PID:4856