Analysis

  • max time kernel
    148s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 03:45

General

  • Target

    Anexo_Registro-PEFIN-SERASA.dll

  • Size

    1.0MB

  • MD5

    c31baf4a8efca208382a4ba48542b4f1

  • SHA1

    b51ca167cbb1350ed4a1d70843eae52876f3f0c9

  • SHA256

    8f65dcdec1f883c5f7122bc11486637a428c9e308968558f4d86cb8b0243dcb2

  • SHA512

    31ce3d77092ce5ea4085f649669b37e18bc3da3bfb60cf97fc1394428842ce3f93e2fc339947a6ba844cdebec7a996493d419266788c07a33070c7c0912e9408

  • SSDEEP

    24576:unF21Q1dE4BcHDaAAxrPnLdgn4MR4vdcGpRBGTuwv91vCQrCEafeZH:E9z2VTuwvrvCQ2g

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Anexo_Registro-PEFIN-SERASA.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Anexo_Registro-PEFIN-SERASA.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1444
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.java.com/pt_BR/
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1224
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1964

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    f990dd626743180f87e51d3adf4546c3

    SHA1

    cbe2db56f733e539b7afd8d44a82765bd228e5fe

    SHA256

    6f2637fa179eed45a2c0eba480db45bec610706a362440d2285e0d2017ae5f50

    SHA512

    f699c525d361e6a6cea5a21834bf4f9daeac0b6fa0d6931b3b2c73638b100f722305ab39c9c4187aaa937bf899c201318da117dda29f27ad5b92879a3008261a

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat
    Filesize

    5KB

    MD5

    0503caad09e4f52710347c8266906c88

    SHA1

    9c3c15d36d4c37fd8b5a6aee965d74c1edf4fb94

    SHA256

    45a5376364f99b723bdf3a3e7c9349e999b14aa851369fe3af9764bf380cd5cb

    SHA512

    1003ff79a2cdcd2f59ec302c506c44d8409bfe82c97de85d414d0b0af054a4c3b37b5f191effbd2027b005d180d70447fb3f868610397a64b8aaae98c076fe8a

  • C:\Users\Admin\AppData\Local\Temp\image.gif
    Filesize

    1KB

    MD5

    832e205e91f45001f3f82abebe0687a6

    SHA1

    5fe753f6287f386eb617b2b391ef5fdf1da3aa1e

    SHA256

    beb98d641323f3e577eab4d357d256c5c6d8e84f4ddad8555569c941ddf3703f

    SHA512

    b70b6f4da4bfb2ac6c3402971c0f729c2a7d08a6a9781f1fb575d64840c3080057770d8897cdb12f44a5c448abe90c6d3fb544d083e555ef9c8896c54ec2246a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WLFG7YPW.txt
    Filesize

    603B

    MD5

    6fd5128ebec5781adb27c99015c57ffd

    SHA1

    beaec8633e6df884dd7a1183c53beacd7a46c96e

    SHA256

    a174cb2cef740622bf4183c75684544e36747b723b1f7f2aef30792c607a3ce2

    SHA512

    aaca73ea1f4f941e0261e1732e6b59b81928b5d7142b99d98e6f086aa34f715a2454ec9d88f96f425477e29aa9d49ccc141363f0c08ff5445faae6ca83eefa9f

  • memory/1348-55-0x0000000075071000-0x0000000075073000-memory.dmp
    Filesize

    8KB

  • memory/1348-54-0x0000000000000000-mapping.dmp
  • memory/1444-59-0x000000003C082744-mapping.dmp
  • memory/1444-64-0x000000003C040000-0x000000003C09F000-memory.dmp
    Filesize

    380KB

  • memory/1444-60-0x000000003C040000-0x000000003C09F000-memory.dmp
    Filesize

    380KB

  • memory/1444-62-0x000000003C040000-0x000000003C09F000-memory.dmp
    Filesize

    380KB

  • memory/1444-58-0x000000003C040000-0x000000003C09F000-memory.dmp
    Filesize

    380KB

  • memory/1444-56-0x000000003C040000-0x000000003C09F000-memory.dmp
    Filesize

    380KB