Analysis
-
max time kernel
119s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
d25be99cd52f5d3b4388bbcedeaaeb36a5ea656e771de4474e55ff2fa461c2e6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d25be99cd52f5d3b4388bbcedeaaeb36a5ea656e771de4474e55ff2fa461c2e6.dll
Resource
win10v2004-20221111-en
General
-
Target
d25be99cd52f5d3b4388bbcedeaaeb36a5ea656e771de4474e55ff2fa461c2e6.dll
-
Size
348KB
-
MD5
e94f8a31dccaec0086f370c22ae4c6e0
-
SHA1
2802a01b8a89e0299c5d3e4bbc70f752094c87a8
-
SHA256
d25be99cd52f5d3b4388bbcedeaaeb36a5ea656e771de4474e55ff2fa461c2e6
-
SHA512
af4f8ed59a38dff42d14902718d35fe9e6a64ffdf6a027e19d991776924c1bd8866715442eed1715a4e4bd3757c1ed2fceb4315223d2f7c5a62be38b985e9fb2
-
SSDEEP
6144:IQb6g1fEi2FSGXbOYvz2+uOpGTIttHUUYTB/tZeXSGxUk1mAjE/FYhfA3u7i3108:IttBEGXKSqEpGTIPdYT9tZeXFxXSydAD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1172 rundll32mgr.exe -
resource yara_rule behavioral1/files/0x0007000000005c50-56.dat upx behavioral1/files/0x0007000000005c50-57.dat upx behavioral1/files/0x0007000000005c50-59.dat upx behavioral1/memory/1172-63-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/1172-64-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1704 rundll32.exe 1704 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1856 1704 WerFault.exe 26 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376577186" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E5FDB71-70AC-11ED-8B0A-7A3897842414} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E5FB461-70AC-11ED-8B0A-7A3897842414} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1172 rundll32mgr.exe 1172 rundll32mgr.exe 1172 rundll32mgr.exe 1172 rundll32mgr.exe 1172 rundll32mgr.exe 1172 rundll32mgr.exe 1172 rundll32mgr.exe 1172 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1172 rundll32mgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1116 iexplore.exe 1780 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1780 iexplore.exe 1780 iexplore.exe 1116 iexplore.exe 1116 iexplore.exe 2040 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1704 1928 rundll32.exe 26 PID 1928 wrote to memory of 1704 1928 rundll32.exe 26 PID 1928 wrote to memory of 1704 1928 rundll32.exe 26 PID 1928 wrote to memory of 1704 1928 rundll32.exe 26 PID 1928 wrote to memory of 1704 1928 rundll32.exe 26 PID 1928 wrote to memory of 1704 1928 rundll32.exe 26 PID 1928 wrote to memory of 1704 1928 rundll32.exe 26 PID 1704 wrote to memory of 1172 1704 rundll32.exe 27 PID 1704 wrote to memory of 1172 1704 rundll32.exe 27 PID 1704 wrote to memory of 1172 1704 rundll32.exe 27 PID 1704 wrote to memory of 1172 1704 rundll32.exe 27 PID 1704 wrote to memory of 1856 1704 rundll32.exe 28 PID 1704 wrote to memory of 1856 1704 rundll32.exe 28 PID 1704 wrote to memory of 1856 1704 rundll32.exe 28 PID 1704 wrote to memory of 1856 1704 rundll32.exe 28 PID 1172 wrote to memory of 1780 1172 rundll32mgr.exe 29 PID 1172 wrote to memory of 1780 1172 rundll32mgr.exe 29 PID 1172 wrote to memory of 1780 1172 rundll32mgr.exe 29 PID 1172 wrote to memory of 1780 1172 rundll32mgr.exe 29 PID 1172 wrote to memory of 1116 1172 rundll32mgr.exe 30 PID 1172 wrote to memory of 1116 1172 rundll32mgr.exe 30 PID 1172 wrote to memory of 1116 1172 rundll32mgr.exe 30 PID 1172 wrote to memory of 1116 1172 rundll32mgr.exe 30 PID 1780 wrote to memory of 1636 1780 iexplore.exe 33 PID 1116 wrote to memory of 2040 1116 iexplore.exe 32 PID 1780 wrote to memory of 1636 1780 iexplore.exe 33 PID 1780 wrote to memory of 1636 1780 iexplore.exe 33 PID 1780 wrote to memory of 1636 1780 iexplore.exe 33 PID 1116 wrote to memory of 2040 1116 iexplore.exe 32 PID 1116 wrote to memory of 2040 1116 iexplore.exe 32 PID 1116 wrote to memory of 2040 1116 iexplore.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d25be99cd52f5d3b4388bbcedeaaeb36a5ea656e771de4474e55ff2fa461c2e6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d25be99cd52f5d3b4388bbcedeaaeb36a5ea656e771de4474e55ff2fa461c2e6.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 2283⤵
- Program crash
PID:1856
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8E5FB461-70AC-11ED-8B0A-7A3897842414}.dat
Filesize3KB
MD5c769898b9c783e80145afb714c339c8c
SHA18dbab055242f18695081e73c53a0c29ed9b4b3da
SHA2564ef62d6306f2dc7984c73351feef00b13e74111a3a525b2a5095f1011db84910
SHA512785838f54239b35bb42bee0fa009054427b5ddea00df43c443546168ab734a82797938bf62c350875b402f0610ca9983b6e549e16818942cdf96faeed1eb489e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8E5FDB71-70AC-11ED-8B0A-7A3897842414}.dat
Filesize4KB
MD574cb4f81cb19cec4a231d399509de614
SHA115f42bf52536b64a4b9d2cd9912a559187c1f2a5
SHA2567724b58975bc3ce3397bfb752ec0c209bff0de47eb3c8d3c17fdd304105c6b10
SHA512c2ab87ce2523be9a4d4fa0228887765079ade2c69b722e18d66723c0d28406472d1a487341603ccec758f3483f77b6d3a0edf523ea6ef8c3d5be5427f6b02981
-
Filesize
606B
MD53a9333fc508f9574dff21c3fca0570f5
SHA1e340b818937ad1c5471aa32a8c49ddbd5c6a1b56
SHA2569f1751b37a6254dd6500b47244d81e6569f7979af78ebbcc7fa937fa97f16913
SHA512b11670ecf6cd7f61597b4128450f5c1f2ab74f8bfdd28d4e652d9ee8209eca1be15e9cff90bc7c1215d1974709559262c5b621b0c8e8dc3d9e8014ef98a0cd8e
-
Filesize
99KB
MD5f3873258a4258a6761dc54d47463182f
SHA1fbbf8bca739ca4e9745e5224662b33b437a52461
SHA25663b02a3e8e7e049d1f29cd4cd79fe5c8905754da6c023df72aa5cca351d0d5c5
SHA512eec16bb41fd05d9acd5d2b17eb5218057c3cd97cd706e0782a64eb2c32f8a57f1206fe0268be7f37a9f1c3f7b8eb09767cf2724951eaee4be03c4d509d4b3dd4
-
Filesize
99KB
MD5f3873258a4258a6761dc54d47463182f
SHA1fbbf8bca739ca4e9745e5224662b33b437a52461
SHA25663b02a3e8e7e049d1f29cd4cd79fe5c8905754da6c023df72aa5cca351d0d5c5
SHA512eec16bb41fd05d9acd5d2b17eb5218057c3cd97cd706e0782a64eb2c32f8a57f1206fe0268be7f37a9f1c3f7b8eb09767cf2724951eaee4be03c4d509d4b3dd4
-
Filesize
99KB
MD5f3873258a4258a6761dc54d47463182f
SHA1fbbf8bca739ca4e9745e5224662b33b437a52461
SHA25663b02a3e8e7e049d1f29cd4cd79fe5c8905754da6c023df72aa5cca351d0d5c5
SHA512eec16bb41fd05d9acd5d2b17eb5218057c3cd97cd706e0782a64eb2c32f8a57f1206fe0268be7f37a9f1c3f7b8eb09767cf2724951eaee4be03c4d509d4b3dd4