Analysis

  • max time kernel
    138s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 06:04

General

  • Target

    88fc2d1a6ba13e7dcdf189f56766cb24a515f21f9d4938d967ad1f63a74b3eea.dll

  • Size

    74KB

  • MD5

    59a50c4e71c1086bce270e3fb9d66284

  • SHA1

    0a940c7e54fd5a4c11973d049f6ccd29272f408a

  • SHA256

    88fc2d1a6ba13e7dcdf189f56766cb24a515f21f9d4938d967ad1f63a74b3eea

  • SHA512

    0a9f47e3a9b9666ae62a26d90b62203cb1ed8de822060816aedb080e050456facdd4876f4e4399221175e9c74bb7bfaac8bd76f581f9c7c0a41243fdb5b0d97d

  • SSDEEP

    1536:Ka5j7tWQQQkqkVgTrSiw+vU8mJqfo0XQYkk/7yO8VFCVL:KaFtWQQJBVgnS5oU8mQfVGk/2/jCV

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\88fc2d1a6ba13e7dcdf189f56766cb24a515f21f9d4938d967ad1f63a74b3eea.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\88fc2d1a6ba13e7dcdf189f56766cb24a515f21f9d4938d967ad1f63a74b3eea.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://noticias.uol.com.br/ultnot/cienciaesaude/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:992
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:992 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1328

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5d6c71d55d7a27c6f2622b98b344b23a

          SHA1

          c31e5cda453fcd324f7135bd6377e67499489a47

          SHA256

          dc344f3fc7a37a63bc2f7de47e2537e3814069e86aa9dddac40df321aebd8192

          SHA512

          74c3e7147356c22ecb35d29cd97c55c060e67a8329b826509f289bc86ae40a91c95f3789d2fa0a89417aa1c51f195fd7d2583a3948e3f2a8c60009bb33907449

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

          Filesize

          138KB

          MD5

          838826fa0ede793efa6492e85757d3f2

          SHA1

          6f3d900d10138266f6706b0476fa54308dc394a8

          SHA256

          1feb2ea51cbec8613067664b2c8c6579cf8331d22fa7ef22a2dc9f169edbad1c

          SHA512

          cfa06a1e6aa7fd01809e1bc00792366a17a0981c1e1827bb389e8aae90a31e1545ba3f12b906a58cb9869dbc5ae586e0beca9ead50d4305a6438946d8c7a3ae2

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BRZ07283.txt

          Filesize

          603B

          MD5

          f942a1a2a1d636f352597cea2af06394

          SHA1

          d71a0d33b965da5ab589ec7dad9aafaaec5121c0

          SHA256

          c2971058958a62bbaf0642d95219df26d939a501e63028bdaca80d754e1a78ef

          SHA512

          49f24c0ff89713b6d7f7e1436a0b816d8d06db8154df279eccb828c3e87f4cee172b74fe7f70659f085eb3ee51e1b45525947532215355676c97c5f472bdc357

        • memory/2044-55-0x0000000075A11000-0x0000000075A13000-memory.dmp

          Filesize

          8KB

        • memory/2044-56-0x0000000000193000-0x00000000001A5000-memory.dmp

          Filesize

          72KB

        • memory/2044-57-0x0000000000150000-0x000000000019E000-memory.dmp

          Filesize

          312KB

        • memory/2044-59-0x0000000000160000-0x00000000001AE000-memory.dmp

          Filesize

          312KB

        • memory/2044-58-0x0000000000150000-0x000000000019E000-memory.dmp

          Filesize

          312KB

        • memory/2044-60-0x0000000000150000-0x000000000019E000-memory.dmp

          Filesize

          312KB