Analysis
-
max time kernel
146s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 07:38
Static task
static1
Behavioral task
behavioral1
Sample
dc65fe33c7659f52d30e22e6d5058c529602da3e3aff73a99f1956ab98fd9dd6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc65fe33c7659f52d30e22e6d5058c529602da3e3aff73a99f1956ab98fd9dd6.dll
Resource
win10v2004-20220812-en
General
-
Target
dc65fe33c7659f52d30e22e6d5058c529602da3e3aff73a99f1956ab98fd9dd6.dll
-
Size
764KB
-
MD5
d9dd7916400113ae5042bdfbb22e21f0
-
SHA1
8a849dc4dd182e8d886bfa81634fcfe4f2d3c5a1
-
SHA256
dc65fe33c7659f52d30e22e6d5058c529602da3e3aff73a99f1956ab98fd9dd6
-
SHA512
e9e094297b2df93b98b54194e66c4cd45f8c932734cf486a324e52f914597fe7e3ac2528460dcd58237df024d504cecd1194e85f0e04129e7fe1f593b6b7abd9
-
SSDEEP
12288:tPTv+CFW4hPdahP/RN2kU7fWS36pweWGJr619QV4qqxEnEk3D6qC5UjuRP4itUMP:tPSH4hQP/RN2fLqNK9QV4qBH1O4i9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rundll32mgr.exepid process 956 rundll32mgr.exe -
Processes:
resource yara_rule \Windows\SysWOW64\rundll32mgr.exe upx \Windows\SysWOW64\rundll32mgr.exe upx C:\Windows\SysWOW64\rundll32mgr.exe upx behavioral1/memory/956-61-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/956-64-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 1748 rundll32.exe 1748 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{59559691-6FC1-11ED-9351-5A21EB137514} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376476158" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5954FA51-6FC1-11ED-9351-5A21EB137514} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
rundll32mgr.exepid process 956 rundll32mgr.exe 956 rundll32mgr.exe 956 rundll32mgr.exe 956 rundll32mgr.exe 956 rundll32mgr.exe 956 rundll32mgr.exe 956 rundll32mgr.exe 956 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32mgr.exedescription pid process Token: SeDebugPrivilege 956 rundll32mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeiexplore.exepid process 1268 iexplore.exe 1532 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1268 iexplore.exe 1532 iexplore.exe 1268 iexplore.exe 1532 iexplore.exe 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1588 IEXPLORE.EXE 1588 IEXPLORE.EXE 1588 IEXPLORE.EXE 1588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
rundll32.exerundll32.exerundll32mgr.exeiexplore.exeiexplore.exedescription pid process target process PID 912 wrote to memory of 1748 912 rundll32.exe rundll32.exe PID 912 wrote to memory of 1748 912 rundll32.exe rundll32.exe PID 912 wrote to memory of 1748 912 rundll32.exe rundll32.exe PID 912 wrote to memory of 1748 912 rundll32.exe rundll32.exe PID 912 wrote to memory of 1748 912 rundll32.exe rundll32.exe PID 912 wrote to memory of 1748 912 rundll32.exe rundll32.exe PID 912 wrote to memory of 1748 912 rundll32.exe rundll32.exe PID 1748 wrote to memory of 956 1748 rundll32.exe rundll32mgr.exe PID 1748 wrote to memory of 956 1748 rundll32.exe rundll32mgr.exe PID 1748 wrote to memory of 956 1748 rundll32.exe rundll32mgr.exe PID 1748 wrote to memory of 956 1748 rundll32.exe rundll32mgr.exe PID 956 wrote to memory of 1532 956 rundll32mgr.exe iexplore.exe PID 956 wrote to memory of 1532 956 rundll32mgr.exe iexplore.exe PID 956 wrote to memory of 1532 956 rundll32mgr.exe iexplore.exe PID 956 wrote to memory of 1532 956 rundll32mgr.exe iexplore.exe PID 956 wrote to memory of 1268 956 rundll32mgr.exe iexplore.exe PID 956 wrote to memory of 1268 956 rundll32mgr.exe iexplore.exe PID 956 wrote to memory of 1268 956 rundll32mgr.exe iexplore.exe PID 956 wrote to memory of 1268 956 rundll32mgr.exe iexplore.exe PID 1268 wrote to memory of 1464 1268 iexplore.exe IEXPLORE.EXE PID 1268 wrote to memory of 1464 1268 iexplore.exe IEXPLORE.EXE PID 1268 wrote to memory of 1464 1268 iexplore.exe IEXPLORE.EXE PID 1268 wrote to memory of 1464 1268 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 1588 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 1588 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 1588 1532 iexplore.exe IEXPLORE.EXE PID 1532 wrote to memory of 1588 1532 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc65fe33c7659f52d30e22e6d5058c529602da3e3aff73a99f1956ab98fd9dd6.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc65fe33c7659f52d30e22e6d5058c529602da3e3aff73a99f1956ab98fd9dd6.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1268 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5954FA51-6FC1-11ED-9351-5A21EB137514}.datFilesize
3KB
MD54f3500fde21c7f70a1e796ca6363c914
SHA18dfe6177539f94e380deacc60f71b29b59e56eb6
SHA2562347311b6f64788f743e4a25a2f36f229b2cb310bcd97d951948bd20bfc03cc9
SHA51240cfe6c9206e1b1770148bf071fcc152965f09286a420df8b43c16abdd8f62ee83f78a88be2209daa97b7d8c8799429f3f23879a652bfcb644da78d82d0382ea
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{59559691-6FC1-11ED-9351-5A21EB137514}.datFilesize
5KB
MD5ecfd17b483f74d25e3549532f6d2e5e1
SHA1466184240e738add3ebab6d69db0a84926f8e951
SHA25698f06234b8372e65c31acac275d755d80a6bf5ecdbc77ebba7da1b4ee6c83a81
SHA512db11c07c9cf398351d7c79011b400d4be5d23ce68aa53950024e38db43869e958f50d79b0f1beb1f3791ad5f07fb562ac2f30575640b915750d0772a674039d2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6J8Z2F5F.txtFilesize
608B
MD5b0e32791c4882721395cec843d6c5683
SHA181eb2fcc87500308d4c606f927f45c4a6ed188cb
SHA256d88d797ed6bb559a76cf2ad3cd6190ebbedbc7a089572e7f5a2a560af0da41c1
SHA5124c4e85c09766400727bcc323baa339aa6ca7250a87d9abaf691f741e64ef67037fc1e42dbbf0463471d3b06addf8b283f6f7840d0fba66ebb7a60ed2aadc51b4
-
C:\Windows\SysWOW64\rundll32mgr.exeFilesize
101KB
MD5162e85589a5dff74d7cf05dbc5d4e8e3
SHA112544e9343869586d1679db02119e127f43d986f
SHA2569cdca823e0d9922662b093a4cb9f313ab4c7c8b9a9199acca683af332d914976
SHA5127ed0c16b13f1863390cf0946538aab5d2f0ff9953fcf1a76fc0ea8aecefc002a31fffa347bb1f5fab8cfeae4777045fb562cc1af3100dcbad72b5db6e007f0f7
-
\Windows\SysWOW64\rundll32mgr.exeFilesize
101KB
MD5162e85589a5dff74d7cf05dbc5d4e8e3
SHA112544e9343869586d1679db02119e127f43d986f
SHA2569cdca823e0d9922662b093a4cb9f313ab4c7c8b9a9199acca683af332d914976
SHA5127ed0c16b13f1863390cf0946538aab5d2f0ff9953fcf1a76fc0ea8aecefc002a31fffa347bb1f5fab8cfeae4777045fb562cc1af3100dcbad72b5db6e007f0f7
-
\Windows\SysWOW64\rundll32mgr.exeFilesize
101KB
MD5162e85589a5dff74d7cf05dbc5d4e8e3
SHA112544e9343869586d1679db02119e127f43d986f
SHA2569cdca823e0d9922662b093a4cb9f313ab4c7c8b9a9199acca683af332d914976
SHA5127ed0c16b13f1863390cf0946538aab5d2f0ff9953fcf1a76fc0ea8aecefc002a31fffa347bb1f5fab8cfeae4777045fb562cc1af3100dcbad72b5db6e007f0f7
-
memory/956-58-0x0000000000000000-mapping.dmp
-
memory/956-61-0x0000000000400000-0x0000000000454000-memory.dmpFilesize
336KB
-
memory/956-64-0x0000000000400000-0x0000000000454000-memory.dmpFilesize
336KB
-
memory/1748-54-0x0000000000000000-mapping.dmp
-
memory/1748-55-0x0000000076091000-0x0000000076093000-memory.dmpFilesize
8KB
-
memory/1748-60-0x0000000000400000-0x0000000000454000-memory.dmpFilesize
336KB