Analysis

  • max time kernel
    168s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 12:29

General

  • Target

    92ec08e55a98246e4deec38931affe382e1bfd39f47d014dc5a30e3b8b2eb4cf.exe

  • Size

    21KB

  • MD5

    bf8503557d267a979c1840b5241f5ea8

  • SHA1

    ba94e45cae97f1f71a45fe234b1aa2bd1ba81698

  • SHA256

    92ec08e55a98246e4deec38931affe382e1bfd39f47d014dc5a30e3b8b2eb4cf

  • SHA512

    ef314220b0921d99a139f744d620c92dc8a3547b232a7268540d23339856ac7266083d42cad0782f8fd0a9d17c5923f6493d43619b0d7e2ed7cb8c30c3b6c65d

  • SSDEEP

    384:oc+h/+GIQMCczE3yzySSAsmXVFwWynCMSc2ZsKw8WS/PtY4JQjYVkwNeso:ox6QA9PTPDhc2ZT0SH6Ysj

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Modifies Shared Task Scheduler registry keys 2 TTPs 2 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92ec08e55a98246e4deec38931affe382e1bfd39f47d014dc5a30e3b8b2eb4cf.exe
    "C:\Users\Admin\AppData\Local\Temp\92ec08e55a98246e4deec38931affe382e1bfd39f47d014dc5a30e3b8b2eb4cf.exe"
    1⤵
    • Modifies security service
    • Windows security bypass
    • Modifies Shared Task Scheduler registry keys
    • Registers COM server for autorun
    • Windows security modification
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:336
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Windows\system32\barseek.dll, load
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      PID:3816

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\barseek.dll

          Filesize

          16KB

          MD5

          2927b7854e17a95473c9b14a241931dd

          SHA1

          2b36d180eebe0123459755934c9806ce1b49b367

          SHA256

          9f185d268e09533a52f8efe0022694e83179c62a2b940be9eb6f24291ee23c52

          SHA512

          37a7495f008f6945067fe94f1be8d0ba58a15d6b33066573f528a688a9da256a1841fd65b6459180fa6348907c8fbe785e0221ed2e0bd78c8899bdc7e31c2688

        • C:\Windows\SysWOW64\barseek.dll

          Filesize

          16KB

          MD5

          2927b7854e17a95473c9b14a241931dd

          SHA1

          2b36d180eebe0123459755934c9806ce1b49b367

          SHA256

          9f185d268e09533a52f8efe0022694e83179c62a2b940be9eb6f24291ee23c52

          SHA512

          37a7495f008f6945067fe94f1be8d0ba58a15d6b33066573f528a688a9da256a1841fd65b6459180fa6348907c8fbe785e0221ed2e0bd78c8899bdc7e31c2688

        • memory/336-132-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/336-136-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/3816-137-0x0000000010000000-0x000000001000C000-memory.dmp

          Filesize

          48KB

        • memory/3816-138-0x0000000010000000-0x000000001000C000-memory.dmp

          Filesize

          48KB