Analysis
-
max time kernel
124s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
IMG1211.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
IMG1211.dll
Resource
win10v2004-20221111-en
General
-
Target
IMG1211.dll
-
Size
1023KB
-
MD5
b3c29186618199b5d6b85d7fd12a23f6
-
SHA1
429880937b6b379c41290378d67894d45590027c
-
SHA256
868eb72051987b281ca0fdba4d93b51a00596c8af170d3d2dc8b3c6d3f695681
-
SHA512
7b34b41f8e8f12857a6299f693f34718e886d514f27a79b4713f473a060c2cb34215993c33cd8e94bdc6c026c8aebbfab2efb89ff677bfce6a154b2f2a25ce10
-
SSDEEP
24576:c7F9ZBWkwuvvX7dGiBFceJgTcwvr1vCQrCCUi:2Vp6TTcwv5vCQ2di
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1644 set thread context of 968 1644 rundll32.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376472182" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{162E63F1-6FB8-11ED-A23F-FE41811C61F5} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001eec8ccdee306f4aa8872e99279a5c7c000000000200000000001066000000010000200000002bacc5472eb979315d89876f460050a30dfea61b27c36594d14dcae08006c18b000000000e80000000020000200000005542bb6fcb37dfb00389d167256eda5e4b85bafc71517d2555ba0f46e7a303f72000000040ef3e9c82caf7872bf89c7d35d2e6d2792adabb41ede57d7cca8148fd90a8b340000000aa79185d537e5aa5d25cc6d39ee64c30060e7b78944af4867abeed0cff3bd168aa9a8f0f25dd628fb536d7253b000d1b16267825062e7dc8a4b1a1fd8adf51c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c65d06c503d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1500 iexplore.exe 1500 iexplore.exe 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE 1448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1672 wrote to memory of 1644 1672 rundll32.exe 27 PID 1644 wrote to memory of 968 1644 rundll32.exe 28 PID 1644 wrote to memory of 968 1644 rundll32.exe 28 PID 1644 wrote to memory of 968 1644 rundll32.exe 28 PID 1644 wrote to memory of 968 1644 rundll32.exe 28 PID 1644 wrote to memory of 968 1644 rundll32.exe 28 PID 1644 wrote to memory of 968 1644 rundll32.exe 28 PID 968 wrote to memory of 1500 968 svchost.exe 29 PID 968 wrote to memory of 1500 968 svchost.exe 29 PID 968 wrote to memory of 1500 968 svchost.exe 29 PID 968 wrote to memory of 1500 968 svchost.exe 29 PID 1500 wrote to memory of 1448 1500 iexplore.exe 31 PID 1500 wrote to memory of 1448 1500 iexplore.exe 31 PID 1500 wrote to memory of 1448 1500 iexplore.exe 31 PID 1500 wrote to memory of 1448 1500 iexplore.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\IMG1211.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\IMG1211.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.java.com/pt_BR/4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccbc5d365b8ade78f010b62affe0bb83
SHA18ec87a2eda77f2b6b7e6c021b4f097878769bb47
SHA25643b127ccc1083f203f3b3b0c86008bf39cefc5ff3a76f5c9a5f3786376520d07
SHA5126b5e00e8b083d781fd69e974c54937c8e3d0a26e2c60e27bfeccb7062c861932759d1db3c2c5df56c20b14a9206f308a24b8076889105c556b45d0847406782c
-
Filesize
1KB
MD5dbdaa836d37b27a4f899cb5dc77f0a7c
SHA15496ddd79be367248e25f675130bbd0e70dd9970
SHA2565df347c2997fa8c7ccac1f1362c767d041d988f752ee52dc70d67a89234d16e3
SHA51212b9fa8e42950930d65f812169c0e58d6b862273aec10e5a24c656ffbba7f079fa78a2fce5b350845abc558ec86162e1c9b6bceb4c37c3312d6f8d88d4ef79f1
-
Filesize
600B
MD50bc7c64c80329fcefe769a118738c573
SHA1043fbf5adc8c22ad16d733188235f74565ce9fef
SHA256b2dbcd8ee1e5f926c1ddd11abfac9fc555ed5b188709078608b85669407e94e6
SHA5128e1ea407e654787a25531584adf65fbb6daaf07973d214150776abfa864bc861e59bda87ec5663e8528a7a458f0b986d29693e8ba5312146322fcec6087b48f1