Analysis

  • max time kernel
    249s
  • max time network
    314s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 08:53

General

  • Target

    5a9485e08e697e5cb22d09718ec72a830af23723a7f44133cd09794531d1efde.dll

  • Size

    545KB

  • MD5

    848a91da2f8ddcd9dad773f7847a97f2

  • SHA1

    20d7cbb48f2cc4fb6c3b7f13715a095ab20dbc6c

  • SHA256

    5a9485e08e697e5cb22d09718ec72a830af23723a7f44133cd09794531d1efde

  • SHA512

    8955832f43331d5649aeccafd68b4ddba5f32e196298933dc7bdbc188a6bdf58e4f44c7fed2f12d351c1cecda51d96ac38a31723a9e4570307ec5d5738669b59

  • SSDEEP

    12288:hDqWCJVf1SRn8M8E/MchvKohrWZF73OwxrZkXlS:haVkRn8MZ/nhv40ErelS

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5a9485e08e697e5cb22d09718ec72a830af23723a7f44133cd09794531d1efde.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5a9485e08e697e5cb22d09718ec72a830af23723a7f44133cd09794531d1efde.dll,#1
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:668
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:908 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:908 CREDAT:275461 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/668-55-0x0000000075D11000-0x0000000075D13000-memory.dmp

    Filesize

    8KB

  • memory/668-56-0x0000000000730000-0x00000000007BB000-memory.dmp

    Filesize

    556KB

  • memory/668-60-0x00000000001B0000-0x0000000000213000-memory.dmp

    Filesize

    396KB