Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 11:06

General

  • Target

    aa8e445cd39fc38cf52e0854ba9b957e4cda9b30a8c2e14e188117ec6ae42991.dll

  • Size

    949KB

  • MD5

    fbdf6a25fef3a7a6ff829852ee01b5c9

  • SHA1

    5c072fcc91f2ce0c6f859703c3ef1a18edc34d2f

  • SHA256

    aa8e445cd39fc38cf52e0854ba9b957e4cda9b30a8c2e14e188117ec6ae42991

  • SHA512

    3d00d3387a4bc0db7cfdee26f70be69a613fea3f381ed9d25151ec81ab5d0340936f5c753ac76df6237c02b66fc1981c91787bd9fcb43ee7fd28836388f1f3a4

  • SSDEEP

    24576:N+YtmDJKpjOZdGFxI/zYd2yykjIm+JOTxpcvupMo/MtBl6:NRlj+ITrcv8MgMl

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\aa8e445cd39fc38cf52e0854ba9b957e4cda9b30a8c2e14e188117ec6ae42991.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\aa8e445cd39fc38cf52e0854ba9b957e4cda9b30a8c2e14e188117ec6ae42991.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.java.com/pt_BR/
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2004
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:1180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    433e633f5d437ecf35c62d7fa974469b

    SHA1

    f040b370da935e64af4d0556e98c20997c7d6095

    SHA256

    9c57bc388bf0c24d470b0fbf44eca4862a6fd0f76d50a52b9fc9d88e854f7aad

    SHA512

    9f234868e1d27f3b3b9519d0d54fc8e166094600bc5d4963586ba4df5caf5963d564f2536e6d8bbb0c580e72c19851faf96e7913e502802ca00621521568a080

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1evexod\imagestore.dat

    Filesize

    5KB

    MD5

    63347c7bda5c34973730ffde14503768

    SHA1

    b2e9e0c10793846b2e8bd5566bbc51c9d4bdde2c

    SHA256

    18a4bf36132705851ceb007f559f5ae6550dfccdbb8c1f0869df226e88dc1c22

    SHA512

    6cf692f664c6415efff700c8edb106cf1b59e13e8b6f975219bdfba5ef21303405c64efee2d5bed026ed51a1c6a77cbbf579728720efb691e5900da7367ec133

  • C:\Users\Admin\AppData\Local\Temp\image.gif

    Filesize

    1KB

    MD5

    e049bc23c1e6882b6dcb165314c43a1e

    SHA1

    c6f2cc0124bc118e5059e7367a5e40cf30a2dc23

    SHA256

    53bda9e517ffc9d0b20f755cff28409d8be263de2140ceef8bef2006078f85e2

    SHA512

    9538d92bd5fca93b3cbc9bb2b1a80d772c049d22ed8cda5b1a5094d543c1bed677d6b201fabf5a159f5f782f9d36be2099d7fef906d171b90d5c24ce5996da2d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\W0JWZM2Q.txt

    Filesize

    601B

    MD5

    138fd6ebeb9d2ad424bea268eb99acdd

    SHA1

    ac30549ba1c24d4e4b277146c4c6f681081847c9

    SHA256

    66cedd8e93e092c97c06a86887526b14568a9152206531a5dc1518ab4c885a13

    SHA512

    941568bc8e02b5b0c51b4539e48b7a3072ca2d6e29a5d8a7af51c7b66576d44ce7290f871b4b0794efd0fddc3ce20e728a536103f4f7750e079f806cabf10fd4

  • memory/532-55-0x0000000075041000-0x0000000075043000-memory.dmp

    Filesize

    8KB

  • memory/532-56-0x0000000000280000-0x0000000000378000-memory.dmp

    Filesize

    992KB

  • memory/532-54-0x0000000000000000-mapping.dmp

  • memory/1644-61-0x0000000008C60000-0x0000000008CBF000-memory.dmp

    Filesize

    380KB

  • memory/1644-65-0x0000000008C60000-0x0000000008CBF000-memory.dmp

    Filesize

    380KB

  • memory/1644-63-0x0000000008C60000-0x0000000008CBF000-memory.dmp

    Filesize

    380KB

  • memory/1644-60-0x0000000008CA2744-mapping.dmp

  • memory/1644-59-0x0000000008C60000-0x0000000008CBF000-memory.dmp

    Filesize

    380KB

  • memory/1644-57-0x0000000008C60000-0x0000000008CBF000-memory.dmp

    Filesize

    380KB