Analysis
-
max time kernel
113s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
08917c1ec847fcd2a331c90cbdc3a42a74ce2ad47f39e79c7a8d29498c1940a3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
08917c1ec847fcd2a331c90cbdc3a42a74ce2ad47f39e79c7a8d29498c1940a3.dll
Resource
win10v2004-20220812-en
General
-
Target
08917c1ec847fcd2a331c90cbdc3a42a74ce2ad47f39e79c7a8d29498c1940a3.dll
-
Size
68KB
-
MD5
7ff0b58720c3a7e0da7b40ce50f06ae8
-
SHA1
c94cce1aab619fa98aa20c7814eed45876036951
-
SHA256
08917c1ec847fcd2a331c90cbdc3a42a74ce2ad47f39e79c7a8d29498c1940a3
-
SHA512
254b3d256dffd67fd026a634259e450653f1bafae201f26acd5fe8c64ef2d02301f5fd8071580621c7d8d48fe3ad6428d1a52909b8a68101756ff3411474fea9
-
SSDEEP
768:GTSrPSeI+n8b1tQ1ztABihk0RGC791frUSzk0eJg5yCpgDDoQLmP3TeagOtLlBo5:GbZgxAQhwIfeMpgPEP37qsXuqBbW
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 948 set thread context of 1436 948 rundll32.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376873782" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20FBED71-735F-11ED-BF3D-D6AAFEFD221A} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1436 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1436 IEXPLORE.EXE 1436 IEXPLORE.EXE 992 IEXPLORE.EXE 992 IEXPLORE.EXE 992 IEXPLORE.EXE 992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 960 wrote to memory of 948 960 rundll32.exe 27 PID 960 wrote to memory of 948 960 rundll32.exe 27 PID 960 wrote to memory of 948 960 rundll32.exe 27 PID 960 wrote to memory of 948 960 rundll32.exe 27 PID 960 wrote to memory of 948 960 rundll32.exe 27 PID 960 wrote to memory of 948 960 rundll32.exe 27 PID 960 wrote to memory of 948 960 rundll32.exe 27 PID 948 wrote to memory of 1436 948 rundll32.exe 28 PID 948 wrote to memory of 1436 948 rundll32.exe 28 PID 948 wrote to memory of 1436 948 rundll32.exe 28 PID 948 wrote to memory of 1436 948 rundll32.exe 28 PID 948 wrote to memory of 1436 948 rundll32.exe 28 PID 1436 wrote to memory of 992 1436 IEXPLORE.EXE 30 PID 1436 wrote to memory of 992 1436 IEXPLORE.EXE 30 PID 1436 wrote to memory of 992 1436 IEXPLORE.EXE 30 PID 1436 wrote to memory of 992 1436 IEXPLORE.EXE 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08917c1ec847fcd2a331c90cbdc3a42a74ce2ad47f39e79c7a8d29498c1940a3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08917c1ec847fcd2a331c90cbdc3a42a74ce2ad47f39e79c7a8d29498c1940a3.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1436 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:992
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
535B
MD5cbfb1611009a5524c871afe9a8b982e0
SHA124619366d39f9a7d576d218f130863f2b9c72ff5
SHA256a7a95d3f232b3edb8cfd668711d0e0fa92a8c3e798ca109219e5f2e95fae9de4
SHA512ae177736f3a7da35ad3225430fc98fa7e9fc8d5f3e5b76d552fa81cf179ba7196dea07a3675046c3dfa41462de7e37c51018847b207e52f4cc94210238ef4a1d