Analysis

  • max time kernel
    117s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 15:00

General

  • Target

    a495503939ddee1be57121606dd2962de73d7f8ef7fd762a647cd9a4a816e00d.exe

  • Size

    3.2MB

  • MD5

    7e1eb2270be513076fd2e331a5814de4

  • SHA1

    506f7292611f1fc0844a09e3d1f110601d03250c

  • SHA256

    a495503939ddee1be57121606dd2962de73d7f8ef7fd762a647cd9a4a816e00d

  • SHA512

    886ec398379ca245a657cb85b6787be7dd7633ddd42f3d1b1fdfad783ba9845db206b389389caa75bd7df39597c450224e71583a65dd816eb93f08c187d59a4c

  • SSDEEP

    98304:U6iau/uUQSG1RFOGyyfY6aT000psOU9P9XD:oau/uUQrHOGtYAsO

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Modifies data under HKEY_USERS 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a495503939ddee1be57121606dd2962de73d7f8ef7fd762a647cd9a4a816e00d.exe
    "C:\Users\Admin\AppData\Local\Temp\a495503939ddee1be57121606dd2962de73d7f8ef7fd762a647cd9a4a816e00d.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\ProcessFoobar\ProcessFoobar.dll",serv -install
      2⤵
      • Loads dropped DLL
      PID:1216
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\ProcessFoobar\ProcessFoobar.dll",serv
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:364
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\ProcessFoobar\ProcessFoobar.dll",serv
      2⤵
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      PID:1904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\Program Files (x86)\ProcessFoobar\ProcessFoobar.dll

    Filesize

    2.2MB

    MD5

    e343a91c7b6661812afc62c2ea9c3b09

    SHA1

    fb87bd7e43838e44bd71d35c1a9204b8d12aef94

    SHA256

    029e3bcd4b5a1347e5688bae68dcc2f52168fd080259c365c6a99fe12c245609

    SHA512

    d5c819c9f9e359797c30acbd05a115f54f02fce7f696ae3ef8ff60a661511903681c4e08e4f118be9527692e870d5897ae8f626524fd044eb15ec1ea60449222

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll

    Filesize

    2.2MB

    MD5

    e343a91c7b6661812afc62c2ea9c3b09

    SHA1

    fb87bd7e43838e44bd71d35c1a9204b8d12aef94

    SHA256

    029e3bcd4b5a1347e5688bae68dcc2f52168fd080259c365c6a99fe12c245609

    SHA512

    d5c819c9f9e359797c30acbd05a115f54f02fce7f696ae3ef8ff60a661511903681c4e08e4f118be9527692e870d5897ae8f626524fd044eb15ec1ea60449222

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll

    Filesize

    2.2MB

    MD5

    e343a91c7b6661812afc62c2ea9c3b09

    SHA1

    fb87bd7e43838e44bd71d35c1a9204b8d12aef94

    SHA256

    029e3bcd4b5a1347e5688bae68dcc2f52168fd080259c365c6a99fe12c245609

    SHA512

    d5c819c9f9e359797c30acbd05a115f54f02fce7f696ae3ef8ff60a661511903681c4e08e4f118be9527692e870d5897ae8f626524fd044eb15ec1ea60449222

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll

    Filesize

    2.2MB

    MD5

    e343a91c7b6661812afc62c2ea9c3b09

    SHA1

    fb87bd7e43838e44bd71d35c1a9204b8d12aef94

    SHA256

    029e3bcd4b5a1347e5688bae68dcc2f52168fd080259c365c6a99fe12c245609

    SHA512

    d5c819c9f9e359797c30acbd05a115f54f02fce7f696ae3ef8ff60a661511903681c4e08e4f118be9527692e870d5897ae8f626524fd044eb15ec1ea60449222

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll

    Filesize

    2.2MB

    MD5

    e343a91c7b6661812afc62c2ea9c3b09

    SHA1

    fb87bd7e43838e44bd71d35c1a9204b8d12aef94

    SHA256

    029e3bcd4b5a1347e5688bae68dcc2f52168fd080259c365c6a99fe12c245609

    SHA512

    d5c819c9f9e359797c30acbd05a115f54f02fce7f696ae3ef8ff60a661511903681c4e08e4f118be9527692e870d5897ae8f626524fd044eb15ec1ea60449222

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll

    Filesize

    2.2MB

    MD5

    e343a91c7b6661812afc62c2ea9c3b09

    SHA1

    fb87bd7e43838e44bd71d35c1a9204b8d12aef94

    SHA256

    029e3bcd4b5a1347e5688bae68dcc2f52168fd080259c365c6a99fe12c245609

    SHA512

    d5c819c9f9e359797c30acbd05a115f54f02fce7f696ae3ef8ff60a661511903681c4e08e4f118be9527692e870d5897ae8f626524fd044eb15ec1ea60449222

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll

    Filesize

    2.2MB

    MD5

    e343a91c7b6661812afc62c2ea9c3b09

    SHA1

    fb87bd7e43838e44bd71d35c1a9204b8d12aef94

    SHA256

    029e3bcd4b5a1347e5688bae68dcc2f52168fd080259c365c6a99fe12c245609

    SHA512

    d5c819c9f9e359797c30acbd05a115f54f02fce7f696ae3ef8ff60a661511903681c4e08e4f118be9527692e870d5897ae8f626524fd044eb15ec1ea60449222

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll

    Filesize

    2.2MB

    MD5

    e343a91c7b6661812afc62c2ea9c3b09

    SHA1

    fb87bd7e43838e44bd71d35c1a9204b8d12aef94

    SHA256

    029e3bcd4b5a1347e5688bae68dcc2f52168fd080259c365c6a99fe12c245609

    SHA512

    d5c819c9f9e359797c30acbd05a115f54f02fce7f696ae3ef8ff60a661511903681c4e08e4f118be9527692e870d5897ae8f626524fd044eb15ec1ea60449222

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll

    Filesize

    2.2MB

    MD5

    e343a91c7b6661812afc62c2ea9c3b09

    SHA1

    fb87bd7e43838e44bd71d35c1a9204b8d12aef94

    SHA256

    029e3bcd4b5a1347e5688bae68dcc2f52168fd080259c365c6a99fe12c245609

    SHA512

    d5c819c9f9e359797c30acbd05a115f54f02fce7f696ae3ef8ff60a661511903681c4e08e4f118be9527692e870d5897ae8f626524fd044eb15ec1ea60449222

  • \Users\Admin\AppData\Local\Temp\tf5bda3a2d.dll

    Filesize

    2.2MB

    MD5

    e343a91c7b6661812afc62c2ea9c3b09

    SHA1

    fb87bd7e43838e44bd71d35c1a9204b8d12aef94

    SHA256

    029e3bcd4b5a1347e5688bae68dcc2f52168fd080259c365c6a99fe12c245609

    SHA512

    d5c819c9f9e359797c30acbd05a115f54f02fce7f696ae3ef8ff60a661511903681c4e08e4f118be9527692e870d5897ae8f626524fd044eb15ec1ea60449222

  • memory/1216-73-0x000000007EC50000-0x000000007EFA8000-memory.dmp

    Filesize

    3.3MB

  • memory/1588-61-0x000000007E7B0000-0x000000007EB08000-memory.dmp

    Filesize

    3.3MB

  • memory/1588-59-0x0000000075CF1000-0x0000000075CF3000-memory.dmp

    Filesize

    8KB

  • memory/1588-54-0x000000007EC60000-0x000000007EFAA000-memory.dmp

    Filesize

    3.3MB