Analysis

  • max time kernel
    185s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 07:47

General

  • Target

    a9ee05e7356e6f882a7f8c4d409e80c931073369f53055f6054be796f0ec5600.dll

  • Size

    671KB

  • MD5

    ee1b0cc0d7225533bc05c08cc96e1485

  • SHA1

    c907c17a25b8dd7b1d1e69b72fc24c06bec83cf8

  • SHA256

    a9ee05e7356e6f882a7f8c4d409e80c931073369f53055f6054be796f0ec5600

  • SHA512

    305f37d1b3672e6acc0a244c0ed268349521bc55493a0fd8fed384578f54a8329eb1c45c721797819557a951b5943875dc8f21041a3b67683f5909ee702f239a

  • SSDEEP

    12288:Tohsg5IxvDzf3R5UUclOJpQ5wCvQAAo+S0PurMaPw2BnG7RQpwpqYlfuIuztA:8Ix/vRuZCQJQI0PurTIRQp6qYdupA

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a9ee05e7356e6f882a7f8c4d409e80c931073369f53055f6054be796f0ec5600.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a9ee05e7356e6f882a7f8c4d409e80c931073369f53055f6054be796f0ec5600.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.java.com/pt_BR/
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1152
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:1176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb76f8ce504ce9c72a8712f4808cfc6c

    SHA1

    1ae7abb18a542ebc47c1472b5cb76cfa8ebc427e

    SHA256

    a2f4313e1e767d36806e0ecdb44046fe4cf4c9dbb694482bd9a8060578ce164a

    SHA512

    ff91979036927de6f673545ecb942b41e17c89dc25e4d827d7e53a507cbfa299c186c0d852f8c27a4959202efe74d086f3a641c223368d463406cfbffae21713

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

    Filesize

    1KB

    MD5

    09077ff613093c6e3b534684d944f6d9

    SHA1

    a9f437c30cf84bb2a6a3efef2623d8de8fda2552

    SHA256

    d26248ceda6bf2433ce99404d3a145e6d6ad569d5433a8312009b8868026e4e7

    SHA512

    ea4cc1ac488ca7fef8a90b781670c58f4073ee8aa3e4099665883b4536f8eb596e4da4bf1f363f50ddf65c18bb7e33ee0b387403d886d040e0828f36b40264bb

  • C:\Users\Admin\AppData\Local\Temp\image.gif

    Filesize

    1002B

    MD5

    94ff00a208cc710d22219e55d2f986a8

    SHA1

    f477b7e1f497561ad80225e1904dedf78a541444

    SHA256

    1e7ce3968b2cfdcea4f4405502859e11f98039a6515c78f7fda52d9674767638

    SHA512

    730a93f5109caad8f4ac05c3b7bf47ae6b8ac5f24cc9407ae5a3a0771e903abdb4c403375d3f3c981c0e9fcc2e3beb4d8f3b2c6c55d31d037b36d2f7d6cf99d0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VN9TPG0L.txt

    Filesize

    608B

    MD5

    9c409d6ab2154ea0a15477ed1ad6e987

    SHA1

    53346f168c5b5d2fddd9307e9320cf51169b8f98

    SHA256

    b1f9bd170ee32d65764fae178cb40a3aa8198df36979f1f8bacfbe79508b41aa

    SHA512

    5ab931c521b180313c446f1a6093a67106c3cb32311a6582b97532b5917281e853a08cae411905033a0853341896230412d3e0ecc183bb7f810543e07be53c3a

  • memory/1716-61-0x000000003C040000-0x000000003C09F000-memory.dmp

    Filesize

    380KB

  • memory/1716-60-0x000000003C082744-mapping.dmp

  • memory/1716-63-0x000000003C040000-0x000000003C09F000-memory.dmp

    Filesize

    380KB

  • memory/1716-59-0x000000003C040000-0x000000003C09F000-memory.dmp

    Filesize

    380KB

  • memory/1716-65-0x000000003C040000-0x000000003C09F000-memory.dmp

    Filesize

    380KB

  • memory/1716-57-0x000000003C040000-0x000000003C09F000-memory.dmp

    Filesize

    380KB

  • memory/2028-54-0x0000000000000000-mapping.dmp

  • memory/2028-56-0x0000000005F80000-0x0000000006127000-memory.dmp

    Filesize

    1.7MB

  • memory/2028-55-0x0000000075291000-0x0000000075293000-memory.dmp

    Filesize

    8KB