Analysis

  • max time kernel
    100s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 00:08

General

  • Target

    d5729a5ff5816bafdf975027bb154b2483d45e00706433148e91c3a75d739346.dll

  • Size

    488KB

  • MD5

    59150b72da8f2a912d57c79533e5614d

  • SHA1

    50a059bb9a12be3461866c36150c51bfb2034bbe

  • SHA256

    d5729a5ff5816bafdf975027bb154b2483d45e00706433148e91c3a75d739346

  • SHA512

    cab3a0877538f8db4851501f517e8a04f2a8a7cda5683d2c2bd259a6182ffcc7b4c9a447e8f1858e8af26ba8635adbef43ff0217086a0fb6db4f14bf06f3f2aa

  • SSDEEP

    12288:KBn7Uu9eEB18wTt2vcv+c2yBxsF8888888888888W88888888888:U7Uu9eW3TtQo+ABx

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d5729a5ff5816bafdf975027bb154b2483d45e00706433148e91c3a75d739346.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d5729a5ff5816bafdf975027bb154b2483d45e00706433148e91c3a75d739346.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:844
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.java.com/pt_BR/
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1656
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1017dcca002b50ab49e34b46fe513803

    SHA1

    16d60521260e274d1c71291c4c8f89652c6dc30b

    SHA256

    a8abcfa6b5b30d0cffc3c5f57c02d24a97147691ff5ca1389a9e24c7d4663a0c

    SHA512

    f84dd942eaa60b12b326bab7cf70940991c2767b322565caffef0019bb735df844e79cc0499698f89ee4445e0d87c2d22ee7aee20626230337cfb258f1278763

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GFY3SWBF.txt

    Filesize

    603B

    MD5

    e9486084d4f162fa61acd46e5ac426b0

    SHA1

    7be998b3a7f521a5d688d3035a9e958cebd81d7b

    SHA256

    f1df570592c91b55a54eb170fc8695d0c2fa4da1a5b6db214927d836d3f0e8b2

    SHA512

    e929baf8f0e216d0a607f4b27dab93eb1e47efea30a6c922ca631a73f0c244c4d4928b13e639bc7a421dd860cee4fa3395aa2c2c318baf0c538ec7c2275d2e01

  • memory/1956-55-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB