Analysis

  • max time kernel
    151s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/11/2022, 23:25

General

  • Target

    ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b.exe

  • Size

    176KB

  • MD5

    df4cbc5b1363f5c2d3a34be5ca069569

  • SHA1

    0ff1c800a301a06caa4a6b52630a944653a80045

  • SHA256

    ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b

  • SHA512

    6332c0fc0fb70dc1b6ec405c41ff2da370c13c7d1e1dbbae687af2b61f677d56f0476ff1814f07aa56f902e5f2129cafbf5b50c81711258016dc48c9f4b2c69e

  • SSDEEP

    3072:LhxvOvoq1qNvoNzlCnnfdcPlHIWOSTVNAyMMULmMng0yslB7d8w:L/Wj4uNzlefdaHicULpngulM

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b.exe
    "C:\Users\Admin\AppData\Local\Temp\ad9273a6ade080a09c3492cd99f39cc27fa517e3c44d825bde9982510834427b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Roaming\vdadf.dll",AInputStream
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1276
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1000 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1304
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1000 CREDAT:275461 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\vdadf.dll

    Filesize

    176KB

    MD5

    a4e8f0bb87ca43d0cdb15b1572df2be8

    SHA1

    4ca7e7fb0bc5b615f3359c93ce5e7c5870ed73cc

    SHA256

    b8c61ea6f620d788ee32afb00853dfe9534d1fedbd4a1f352f736d83dd761fcd

    SHA512

    9fdf0632b9de4fe288a8e4ab0679c9f8bc4bfc523637ba98ed1798d32120618e2379f87bfed80dedf63f1c329fa1f1ba8b31d0faeeec4678c000e7b5fbacb540

  • \Users\Admin\AppData\Roaming\vdadf.dll

    Filesize

    176KB

    MD5

    a4e8f0bb87ca43d0cdb15b1572df2be8

    SHA1

    4ca7e7fb0bc5b615f3359c93ce5e7c5870ed73cc

    SHA256

    b8c61ea6f620d788ee32afb00853dfe9534d1fedbd4a1f352f736d83dd761fcd

    SHA512

    9fdf0632b9de4fe288a8e4ab0679c9f8bc4bfc523637ba98ed1798d32120618e2379f87bfed80dedf63f1c329fa1f1ba8b31d0faeeec4678c000e7b5fbacb540

  • \Users\Admin\AppData\Roaming\vdadf.dll

    Filesize

    176KB

    MD5

    a4e8f0bb87ca43d0cdb15b1572df2be8

    SHA1

    4ca7e7fb0bc5b615f3359c93ce5e7c5870ed73cc

    SHA256

    b8c61ea6f620d788ee32afb00853dfe9534d1fedbd4a1f352f736d83dd761fcd

    SHA512

    9fdf0632b9de4fe288a8e4ab0679c9f8bc4bfc523637ba98ed1798d32120618e2379f87bfed80dedf63f1c329fa1f1ba8b31d0faeeec4678c000e7b5fbacb540

  • \Users\Admin\AppData\Roaming\vdadf.dll

    Filesize

    176KB

    MD5

    a4e8f0bb87ca43d0cdb15b1572df2be8

    SHA1

    4ca7e7fb0bc5b615f3359c93ce5e7c5870ed73cc

    SHA256

    b8c61ea6f620d788ee32afb00853dfe9534d1fedbd4a1f352f736d83dd761fcd

    SHA512

    9fdf0632b9de4fe288a8e4ab0679c9f8bc4bfc523637ba98ed1798d32120618e2379f87bfed80dedf63f1c329fa1f1ba8b31d0faeeec4678c000e7b5fbacb540

  • \Users\Admin\AppData\Roaming\vdadf.dll

    Filesize

    176KB

    MD5

    a4e8f0bb87ca43d0cdb15b1572df2be8

    SHA1

    4ca7e7fb0bc5b615f3359c93ce5e7c5870ed73cc

    SHA256

    b8c61ea6f620d788ee32afb00853dfe9534d1fedbd4a1f352f736d83dd761fcd

    SHA512

    9fdf0632b9de4fe288a8e4ab0679c9f8bc4bfc523637ba98ed1798d32120618e2379f87bfed80dedf63f1c329fa1f1ba8b31d0faeeec4678c000e7b5fbacb540

  • memory/1276-70-0x0000000000170000-0x000000000019E000-memory.dmp

    Filesize

    184KB

  • memory/1276-74-0x0000000010000000-0x000000001002E000-memory.dmp

    Filesize

    184KB

  • memory/1276-75-0x00000000000B0000-0x00000000000C5000-memory.dmp

    Filesize

    84KB

  • memory/1324-61-0x0000000000220000-0x0000000000235000-memory.dmp

    Filesize

    84KB

  • memory/1324-60-0x0000000010000000-0x000000001002E000-memory.dmp

    Filesize

    184KB

  • memory/1324-56-0x0000000000250000-0x000000000027E000-memory.dmp

    Filesize

    184KB

  • memory/1324-55-0x0000000000220000-0x0000000000235000-memory.dmp

    Filesize

    84KB

  • memory/1324-54-0x00000000752B1000-0x00000000752B3000-memory.dmp

    Filesize

    8KB