Analysis
-
max time kernel
160s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
0f87cd4e621163f8c59d0bd5023440a34ca25d63180ea6d5f700f3f84fde740e.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0f87cd4e621163f8c59d0bd5023440a34ca25d63180ea6d5f700f3f84fde740e.dll
Resource
win10v2004-20220812-en
General
-
Target
0f87cd4e621163f8c59d0bd5023440a34ca25d63180ea6d5f700f3f84fde740e.dll
-
Size
505KB
-
MD5
0f68938e1640d999b2b5c7465c6568d0
-
SHA1
ec28d4b465023055874472e715c800a4dc5799e1
-
SHA256
0f87cd4e621163f8c59d0bd5023440a34ca25d63180ea6d5f700f3f84fde740e
-
SHA512
abbe749f1d8f3462a69f2b56158dd594a300871e4c26a6bb70b03a0f6a418c30c335d6254802d6d589cf003620b67a3b1543aa219d5f49519ef48350eebe1dae
-
SSDEEP
6144:SvkwugFljp/JNH1LcMah12soHDCoFaNEVscpqVpEHU/4Jgbcy:Svkwump/JNH1QPjvnNEVscsVOHU/Kfy
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1128 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\plguxes = "regsvr32.exe \"C:\\ProgramData\\plguxes.dat\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\plguxes = "regsvr32.exe \"C:\\ProgramData\\plguxes.dat\"" Explorer.EXE -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" Explorer.EXE -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" Explorer.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\TabProcGrowth = "0" Explorer.EXE -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Wow6432Node rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Wow6432Node\CLSID rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{3BA2152D-56C9-436C-948C-79C7273842A6} Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{1C63532E-1677-47CD-ABAC-7C1D2B926C03} Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{3BA2152D-56C9-436C-948C-79C7273842A6}\#cert = 31 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{3BA2152D-56C9-436C-948C-79C7273842A6} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Wow6432Node\CLSID\{3BA2152D-56C9-436C-948C-79C7273842A6} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{1C63532E-1677-47CD-ABAC-7C1D2B926C03}\{2AB16959-0D36-424D-8072-0F7C20E8502A} = 30177c31 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID\{1C63532E-1677-47CD-ABAC-7C1D2B926C03} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Wow6432Node\CLSID\{1C63532E-1677-47CD-ABAC-7C1D2B926C03} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Wow6432Node\CLSID\{3BA2152D-56C9-436C-948C-79C7273842A6}\#sd = 433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c54656d705c306638376364346536323131363366386335396430626435303233343430613334636132356436333138306561366435663730306633663834666465373430652e646c6c00 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1128 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeCreateGlobalPrivilege 1212 Explorer.EXE Token: SeShutdownPrivilege 1212 Explorer.EXE Token: SeDebugPrivilege 1212 Explorer.EXE Token: SeCreateGlobalPrivilege 1644 rundll32.exe Token: SeShutdownPrivilege 1644 rundll32.exe Token: SeDebugPrivilege 1644 rundll32.exe Token: SeCreateGlobalPrivilege 1128 rundll32.exe Token: SeShutdownPrivilege 1128 rundll32.exe Token: SeDebugPrivilege 1128 rundll32.exe Token: SeShutdownPrivilege 1212 Explorer.EXE Token: SeShutdownPrivilege 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1128 1644 rundll32.exe 28 PID 1644 wrote to memory of 1128 1644 rundll32.exe 28 PID 1644 wrote to memory of 1128 1644 rundll32.exe 28 PID 1644 wrote to memory of 1128 1644 rundll32.exe 28 PID 1644 wrote to memory of 1128 1644 rundll32.exe 28 PID 1644 wrote to memory of 1128 1644 rundll32.exe 28 PID 1644 wrote to memory of 1128 1644 rundll32.exe 28 PID 1128 wrote to memory of 1212 1128 rundll32.exe 13 PID 1128 wrote to memory of 1212 1128 rundll32.exe 13 PID 1128 wrote to memory of 1644 1128 rundll32.exe 16 PID 1128 wrote to memory of 1644 1128 rundll32.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1212 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f87cd4e621163f8c59d0bd5023440a34ca25d63180ea6d5f700f3f84fde740e.dll,#12⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0f87cd4e621163f8c59d0bd5023440a34ca25d63180ea6d5f700f3f84fde740e.dll,#13⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD55cbb2c290bf6716db5c687846fdb035c
SHA1bfc6673f63a5e55270225cbe89eb0ee2df05678e
SHA25633b9a4b957e9f59dad7d477e327f0a5841a69e3a98d806617e9d0416c1ab5961
SHA5120616ce8f0b3dd36823cc11ffcc16fb207fadacfb348ef631dc127186c32fc87005a1033ac7e9a5500be1dfe694f286a8c04d404d4f9e5e2c680481b371dcf163
-
Filesize
258KB
MD55cbb2c290bf6716db5c687846fdb035c
SHA1bfc6673f63a5e55270225cbe89eb0ee2df05678e
SHA25633b9a4b957e9f59dad7d477e327f0a5841a69e3a98d806617e9d0416c1ab5961
SHA5120616ce8f0b3dd36823cc11ffcc16fb207fadacfb348ef631dc127186c32fc87005a1033ac7e9a5500be1dfe694f286a8c04d404d4f9e5e2c680481b371dcf163