Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 00:30

General

  • Target

    9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe

  • Size

    144KB

  • MD5

    21a6758e4971d6ae338c5ef05c5fca42

  • SHA1

    a037b220d8a1de3907916eb7ac6bfa7edf40dfed

  • SHA256

    9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c

  • SHA512

    be36593e0b1669d8e71a381cc0f59bf82e2be3251118815a825fc2aafa4e36b31bd9e4e6414971f46295bb177bb68f2ef0f64eab3fec446ac3db074917968ade

  • SSDEEP

    3072:8R8CTNOgBw//psO5O1IX6gET/JTG4HZbjnCL6dgfNJZMqGmwmwmR:gNBw//psO5mIX6gETtGupn1gffZMqGma

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe
    "C:\Users\Admin\AppData\Local\Temp\9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Roaming\wituv.dll",GetSystemParameter
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:4760
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:3420
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3828
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3828 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4188
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3828 CREDAT:17414 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:240
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3828 CREDAT:17418 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1400
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3828 CREDAT:17422 /prefetch:2
        2⤵
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2552

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      4132c54f59c529167c112e7f519120fa

      SHA1

      94cc9036fa031258aa744c7ee88e3c0b6c7a73da

      SHA256

      e9f456cf8bb8cc4a683d1c2f792feeb4c83fff24a86e6bcb260eff8fbff126fb

      SHA512

      e8efb8e81a90ffbe177301fbba4470ded104fc6d12cfa0123938b981d612eb2c4a66bb47b585cd43ed6ed4940e0ad5a1e3a5d9d18f8cb643e741aae694c4baee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      c418096100986fce5feb6a233ed6aa13

      SHA1

      a629e4f3b0bfc3bae8d9a93c29ba6c8f15a5a72f

      SHA256

      ccccba1efd9a6f8644aeaaf3304998560d546c6d78a1aa9a4592171087dc0bf0

      SHA512

      1bc97072204136e774b6a86989110d9453878d13bc80b1790068c9b3d398d5315c9f4b346a0116d10ec526b339479d5f0af81cd74dd260d2565ba8104a113800

    • C:\Users\Admin\AppData\Roaming\wituv.dll

      Filesize

      144KB

      MD5

      af0735d19fd061f5dd3dad228cf0ad48

      SHA1

      684fe904078ad5f09b2824900bbc3d2c22f22ef7

      SHA256

      f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c

      SHA512

      d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8

    • C:\Users\Admin\AppData\Roaming\wituv.dll

      Filesize

      144KB

      MD5

      af0735d19fd061f5dd3dad228cf0ad48

      SHA1

      684fe904078ad5f09b2824900bbc3d2c22f22ef7

      SHA256

      f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c

      SHA512

      d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8

    • C:\Users\Admin\AppData\Roaming\wituv.dll

      Filesize

      144KB

      MD5

      af0735d19fd061f5dd3dad228cf0ad48

      SHA1

      684fe904078ad5f09b2824900bbc3d2c22f22ef7

      SHA256

      f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c

      SHA512

      d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8

    • C:\Users\Admin\AppData\Roaming\wituv.dll

      Filesize

      144KB

      MD5

      af0735d19fd061f5dd3dad228cf0ad48

      SHA1

      684fe904078ad5f09b2824900bbc3d2c22f22ef7

      SHA256

      f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c

      SHA512

      d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8

    • memory/4760-140-0x0000000000700000-0x0000000000727000-memory.dmp

      Filesize

      156KB

    • memory/4760-144-0x00000000006D0000-0x00000000006E4000-memory.dmp

      Filesize

      80KB

    • memory/4864-132-0x0000000002020000-0x0000000002047000-memory.dmp

      Filesize

      156KB

    • memory/4864-136-0x0000000000650000-0x0000000000664000-memory.dmp

      Filesize

      80KB