Analysis

  • max time kernel
    138s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 16:07

General

  • Target

    1c0f70233f236eb78acb22555211391647c9391db724697a2128c1364e8e97a4.exe

  • Size

    3.3MB

  • MD5

    ee794142ef0700efa402bf7af68086ee

  • SHA1

    9f73c61754585a8d3aff07d5cf4fcacd4d17254f

  • SHA256

    1c0f70233f236eb78acb22555211391647c9391db724697a2128c1364e8e97a4

  • SHA512

    f3c6c6ce6bfa67a05a37fde4ae358e296d114be2143e8cb625402fa46ffd0afe5e8302c9762ee7eb58fbcdc2ff9f1e1e8170ac327cb6c8bbced7fcd0b81597dc

  • SSDEEP

    49152:zTvrQRdw+m31CVpRJa+fuRLr/XugjR3+TN0ZVmkmvF9AQTDGrmdkNVN9o:zTvrQ/m31Kf0LxR3+N0/L2eG

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Modifies data under HKEY_USERS 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c0f70233f236eb78acb22555211391647c9391db724697a2128c1364e8e97a4.exe
    "C:\Users\Admin\AppData\Local\Temp\1c0f70233f236eb78acb22555211391647c9391db724697a2128c1364e8e97a4.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\ProcessFoobar\ProcessFoobar.dll",serv -install
      2⤵
      • Loads dropped DLL
      PID:588
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\ProcessFoobar\ProcessFoobar.dll",serv
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\ProcessFoobar\ProcessFoobar.dll",serv
      2⤵
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:1780

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\Program Files (x86)\ProcessFoobar\ProcessFoobar.dll
    Filesize

    2.3MB

    MD5

    7f468aa2e4b365cf62ec00c4b74b404c

    SHA1

    a61b39f0623fdd1788702c3e990957fdb8c5601f

    SHA256

    94e6dca5ed94f71a0ed97c4c5d0a7f947d6ba523ea635e240471128cb19b6ec5

    SHA512

    18609bdea8afe780b8a5de31cbf199dab6e6a6e2e72726f3ae7bc95757bc2351ed85780f870662b71edfd54b2f8d7d4916cc109a9d238b2b82ad2d8f273255b7

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll
    Filesize

    2.3MB

    MD5

    7f468aa2e4b365cf62ec00c4b74b404c

    SHA1

    a61b39f0623fdd1788702c3e990957fdb8c5601f

    SHA256

    94e6dca5ed94f71a0ed97c4c5d0a7f947d6ba523ea635e240471128cb19b6ec5

    SHA512

    18609bdea8afe780b8a5de31cbf199dab6e6a6e2e72726f3ae7bc95757bc2351ed85780f870662b71edfd54b2f8d7d4916cc109a9d238b2b82ad2d8f273255b7

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll
    Filesize

    2.3MB

    MD5

    7f468aa2e4b365cf62ec00c4b74b404c

    SHA1

    a61b39f0623fdd1788702c3e990957fdb8c5601f

    SHA256

    94e6dca5ed94f71a0ed97c4c5d0a7f947d6ba523ea635e240471128cb19b6ec5

    SHA512

    18609bdea8afe780b8a5de31cbf199dab6e6a6e2e72726f3ae7bc95757bc2351ed85780f870662b71edfd54b2f8d7d4916cc109a9d238b2b82ad2d8f273255b7

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll
    Filesize

    2.3MB

    MD5

    7f468aa2e4b365cf62ec00c4b74b404c

    SHA1

    a61b39f0623fdd1788702c3e990957fdb8c5601f

    SHA256

    94e6dca5ed94f71a0ed97c4c5d0a7f947d6ba523ea635e240471128cb19b6ec5

    SHA512

    18609bdea8afe780b8a5de31cbf199dab6e6a6e2e72726f3ae7bc95757bc2351ed85780f870662b71edfd54b2f8d7d4916cc109a9d238b2b82ad2d8f273255b7

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll
    Filesize

    2.3MB

    MD5

    7f468aa2e4b365cf62ec00c4b74b404c

    SHA1

    a61b39f0623fdd1788702c3e990957fdb8c5601f

    SHA256

    94e6dca5ed94f71a0ed97c4c5d0a7f947d6ba523ea635e240471128cb19b6ec5

    SHA512

    18609bdea8afe780b8a5de31cbf199dab6e6a6e2e72726f3ae7bc95757bc2351ed85780f870662b71edfd54b2f8d7d4916cc109a9d238b2b82ad2d8f273255b7

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll
    Filesize

    2.3MB

    MD5

    7f468aa2e4b365cf62ec00c4b74b404c

    SHA1

    a61b39f0623fdd1788702c3e990957fdb8c5601f

    SHA256

    94e6dca5ed94f71a0ed97c4c5d0a7f947d6ba523ea635e240471128cb19b6ec5

    SHA512

    18609bdea8afe780b8a5de31cbf199dab6e6a6e2e72726f3ae7bc95757bc2351ed85780f870662b71edfd54b2f8d7d4916cc109a9d238b2b82ad2d8f273255b7

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll
    Filesize

    2.3MB

    MD5

    7f468aa2e4b365cf62ec00c4b74b404c

    SHA1

    a61b39f0623fdd1788702c3e990957fdb8c5601f

    SHA256

    94e6dca5ed94f71a0ed97c4c5d0a7f947d6ba523ea635e240471128cb19b6ec5

    SHA512

    18609bdea8afe780b8a5de31cbf199dab6e6a6e2e72726f3ae7bc95757bc2351ed85780f870662b71edfd54b2f8d7d4916cc109a9d238b2b82ad2d8f273255b7

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll
    Filesize

    2.3MB

    MD5

    7f468aa2e4b365cf62ec00c4b74b404c

    SHA1

    a61b39f0623fdd1788702c3e990957fdb8c5601f

    SHA256

    94e6dca5ed94f71a0ed97c4c5d0a7f947d6ba523ea635e240471128cb19b6ec5

    SHA512

    18609bdea8afe780b8a5de31cbf199dab6e6a6e2e72726f3ae7bc95757bc2351ed85780f870662b71edfd54b2f8d7d4916cc109a9d238b2b82ad2d8f273255b7

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll
    Filesize

    2.3MB

    MD5

    7f468aa2e4b365cf62ec00c4b74b404c

    SHA1

    a61b39f0623fdd1788702c3e990957fdb8c5601f

    SHA256

    94e6dca5ed94f71a0ed97c4c5d0a7f947d6ba523ea635e240471128cb19b6ec5

    SHA512

    18609bdea8afe780b8a5de31cbf199dab6e6a6e2e72726f3ae7bc95757bc2351ed85780f870662b71edfd54b2f8d7d4916cc109a9d238b2b82ad2d8f273255b7

  • \Program Files (x86)\ProcessFoobar\ProcessFoobar.dll
    Filesize

    2.3MB

    MD5

    7f468aa2e4b365cf62ec00c4b74b404c

    SHA1

    a61b39f0623fdd1788702c3e990957fdb8c5601f

    SHA256

    94e6dca5ed94f71a0ed97c4c5d0a7f947d6ba523ea635e240471128cb19b6ec5

    SHA512

    18609bdea8afe780b8a5de31cbf199dab6e6a6e2e72726f3ae7bc95757bc2351ed85780f870662b71edfd54b2f8d7d4916cc109a9d238b2b82ad2d8f273255b7

  • \Users\Admin\AppData\Local\Temp\tf4b5b129e.dll
    Filesize

    2.3MB

    MD5

    7f468aa2e4b365cf62ec00c4b74b404c

    SHA1

    a61b39f0623fdd1788702c3e990957fdb8c5601f

    SHA256

    94e6dca5ed94f71a0ed97c4c5d0a7f947d6ba523ea635e240471128cb19b6ec5

    SHA512

    18609bdea8afe780b8a5de31cbf199dab6e6a6e2e72726f3ae7bc95757bc2351ed85780f870662b71edfd54b2f8d7d4916cc109a9d238b2b82ad2d8f273255b7

  • memory/588-66-0x0000000000000000-mapping.dmp
  • memory/588-73-0x000000007EC50000-0x000000007EFA8000-memory.dmp
    Filesize

    3.3MB

  • memory/996-61-0x000000007E790000-0x000000007EAE8000-memory.dmp
    Filesize

    3.3MB

  • memory/996-54-0x000000007EC40000-0x000000007EFA9000-memory.dmp
    Filesize

    3.4MB

  • memory/996-59-0x00000000760E1000-0x00000000760E3000-memory.dmp
    Filesize

    8KB

  • memory/1780-78-0x0000000000000000-mapping.dmp
  • memory/1780-84-0x000000007EC50000-0x000000007EFA8000-memory.dmp
    Filesize

    3.3MB