Analysis

  • max time kernel
    169s
  • max time network
    214s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 12:34

General

  • Target

    3c074926ce4981afc9867f7244c9a29031e4a1a86162b0168d1ee4eda35d48f3.dll

  • Size

    474KB

  • MD5

    4bb24dee579cdc4b353f170c04f662af

  • SHA1

    cf8623df295c7a6e155f7df622e0a4ef9c8085fa

  • SHA256

    3c074926ce4981afc9867f7244c9a29031e4a1a86162b0168d1ee4eda35d48f3

  • SHA512

    0554484e0d604578e89ca2499cd66bd78bd6856ef15cd1176f7d9e9add6c5a91ca954a333fc9c327f825b5f5639dc66ecde38fdcdcf8eb4f7b26c46f2b18fb4f

  • SSDEEP

    12288:QzanSL88avFSYx3M/61pvggSgXfim9g4yZze0cIGm:uaSJa19BvGgviv9uN

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c074926ce4981afc9867f7244c9a29031e4a1a86162b0168d1ee4eda35d48f3.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c074926ce4981afc9867f7244c9a29031e4a1a86162b0168d1ee4eda35d48f3.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.java.com/pt_BR/
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            PID:632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    52dbf2c9e903b12ee9ee899c9d106da7

    SHA1

    409f2f0f5ba15d5f2a88849b98120862ed727208

    SHA256

    8c5cf7dda794ebee8b647751726b20614ee5749416f7eedee9b18c86cd9f058e

    SHA512

    06585cfebfe00e4781efc89c0ce8ae4c687a6f49c551c6cb637e0d7b78e0cac2ea550de0030217c8245d3d6e9f21e84ac8348ad48887cf1f7ed4c029c91652a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b2622457e9fb029892e081b123f86eea

    SHA1

    944e96f40485c77f85c63eba0bbc2d2188d10322

    SHA256

    11115553aa41b8a631c81103c70d6e9c602a3db87ca49b00dea81ef4c6f11dff

    SHA512

    5c082f49832542fcaf7ca00c511aba0ee42d126e9fe8cc927814bf54463ea7a86b923ff700a7601a0b8db6aa38ba61baac523209295a84ae8b4d411a5639617b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    5KB

    MD5

    a72e9a83ddc65b4b298b3597a44437cf

    SHA1

    387bb6e08d615e9878edc545b81e3495fc2c1912

    SHA256

    3020bd8fee98f9ab9a308f8a4ac0a6ad89b9ddac0ea8b82b34f90e73eee02fe9

    SHA512

    a7abb4b2a5b254113bf37c67931be389b4d3560f626e78d321c732c798ac3111733bf3a9b9f2e750d6e6092b94ef2b369909ffc7496b6efd86efabc398bbfd2a

  • C:\Users\Admin\AppData\Local\Temp\image.gif

    Filesize

    1KB

    MD5

    c689653507bf5ae696ce577386769c6f

    SHA1

    956b6e8b831a1c3da45e9a1ddb840bd79c18e118

    SHA256

    f844e320b24aa226dec52081aa82245710f7483513b47d0cc1cac17c4e97ba95

    SHA512

    f49cccf9fb619284e4d64058d953b110a7e6c91746a194de6b98a296f427b0ef6e20e236963d1ea9beb3cb7a529dd2e9cde7809308f79be3b98fc5c30c0d3b4e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3WYRZ5YD.txt

    Filesize

    603B

    MD5

    32fb6357bde6d48589846a86ebef4ed0

    SHA1

    b4b5ddab6427b5b8525aa4f120d26f5dc33eab15

    SHA256

    a012978cd8d6354943574134fb41fb7461c4cd2068b6205305794cc57fc8dee9

    SHA512

    c5cdaf9fa03a8cce2ff8ecd0991c40c781b01378989bded91744d1c7ec3f93401a1200615f045fbe1c86d17a802ee8bc428dae40da5c726e5cdfa702a76ecb50

  • memory/1768-59-0x0000000008C60000-0x0000000008CBF000-memory.dmp

    Filesize

    380KB

  • memory/1768-63-0x0000000008C60000-0x0000000008CBF000-memory.dmp

    Filesize

    380KB

  • memory/1768-61-0x0000000008C60000-0x0000000008CBF000-memory.dmp

    Filesize

    380KB

  • memory/1768-65-0x0000000008C60000-0x0000000008CBF000-memory.dmp

    Filesize

    380KB

  • memory/1768-68-0x0000000008C60000-0x0000000008CBF000-memory.dmp

    Filesize

    380KB

  • memory/1768-57-0x0000000008C60000-0x0000000008CBF000-memory.dmp

    Filesize

    380KB

  • memory/2044-66-0x0000000002F40000-0x000000000303B000-memory.dmp

    Filesize

    1004KB

  • memory/2044-56-0x0000000002F40000-0x000000000303B000-memory.dmp

    Filesize

    1004KB

  • memory/2044-55-0x00000000753C1000-0x00000000753C3000-memory.dmp

    Filesize

    8KB