Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe
Resource
win10v2004-20221111-en
General
-
Target
dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe
-
Size
154KB
-
MD5
dff4b1e26c72c873d0088c22cbcc884f
-
SHA1
0b82100e3736ddfcecbf12feaa7baa38aa042444
-
SHA256
dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508
-
SHA512
21d7fa84d071d61161e80579cfc73e79bfcf133371a82cdafe0641569e9f5662d0ff991fefa83d5f994feabe6e3f7d8eb2ffb4b55ee445a908f51224077216ed
-
SSDEEP
3072:8TRwpQuBwEkJmrUSg+cbCS6Q3esw21WpIdpwQjE16p7ntW72StNbDJvUaH:8WJ/kA/cj6Wesd1Wp6wQjtW1
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 620 dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe 1268 rundll32.exe 1268 rundll32.exe 1268 rundll32.exe 1268 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tatcp = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\tatcp.dll\",HrIStreamWToBSTR" dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{120139A1-7513-11ED-BE8B-FAA138970F28} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 620 dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1536 1504 iexplore.exe 29 PID 1504 wrote to memory of 1536 1504 iexplore.exe 29 PID 1504 wrote to memory of 1536 1504 iexplore.exe 29 PID 1504 wrote to memory of 1536 1504 iexplore.exe 29 PID 620 wrote to memory of 1268 620 dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe 30 PID 620 wrote to memory of 1268 620 dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe 30 PID 620 wrote to memory of 1268 620 dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe 30 PID 620 wrote to memory of 1268 620 dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe 30 PID 620 wrote to memory of 1268 620 dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe 30 PID 620 wrote to memory of 1268 620 dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe 30 PID 620 wrote to memory of 1268 620 dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe"C:\Users\Admin\AppData\Local\Temp\dc0827befcb546f241a767b83efa697a57eff75a2b376e36a2ac166c58a64508.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\tatcp.dll",HrGetStreamSize2⤵
- Loads dropped DLL
PID:1268
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD580bf7a55132272c542b0f74ea0666616
SHA19223dbb2ab6c2b52450ed820925e6b705551ec64
SHA25641fa6ab7067d886a835c1adecd66078fd9d8b3418a7e0d890b1c77e059b87030
SHA512a47bef086fbb43dd91e2f95abe2228a0947bd51460b435b0d5e7077ba9082478e341f7fc14bb55f6609600a81f87197687d484d8cb35c7980330d3e645d2fbaa
-
Filesize
154KB
MD580bf7a55132272c542b0f74ea0666616
SHA19223dbb2ab6c2b52450ed820925e6b705551ec64
SHA25641fa6ab7067d886a835c1adecd66078fd9d8b3418a7e0d890b1c77e059b87030
SHA512a47bef086fbb43dd91e2f95abe2228a0947bd51460b435b0d5e7077ba9082478e341f7fc14bb55f6609600a81f87197687d484d8cb35c7980330d3e645d2fbaa
-
Filesize
154KB
MD580bf7a55132272c542b0f74ea0666616
SHA19223dbb2ab6c2b52450ed820925e6b705551ec64
SHA25641fa6ab7067d886a835c1adecd66078fd9d8b3418a7e0d890b1c77e059b87030
SHA512a47bef086fbb43dd91e2f95abe2228a0947bd51460b435b0d5e7077ba9082478e341f7fc14bb55f6609600a81f87197687d484d8cb35c7980330d3e645d2fbaa
-
Filesize
154KB
MD580bf7a55132272c542b0f74ea0666616
SHA19223dbb2ab6c2b52450ed820925e6b705551ec64
SHA25641fa6ab7067d886a835c1adecd66078fd9d8b3418a7e0d890b1c77e059b87030
SHA512a47bef086fbb43dd91e2f95abe2228a0947bd51460b435b0d5e7077ba9082478e341f7fc14bb55f6609600a81f87197687d484d8cb35c7980330d3e645d2fbaa
-
Filesize
154KB
MD580bf7a55132272c542b0f74ea0666616
SHA19223dbb2ab6c2b52450ed820925e6b705551ec64
SHA25641fa6ab7067d886a835c1adecd66078fd9d8b3418a7e0d890b1c77e059b87030
SHA512a47bef086fbb43dd91e2f95abe2228a0947bd51460b435b0d5e7077ba9082478e341f7fc14bb55f6609600a81f87197687d484d8cb35c7980330d3e645d2fbaa
-
Filesize
154KB
MD580bf7a55132272c542b0f74ea0666616
SHA19223dbb2ab6c2b52450ed820925e6b705551ec64
SHA25641fa6ab7067d886a835c1adecd66078fd9d8b3418a7e0d890b1c77e059b87030
SHA512a47bef086fbb43dd91e2f95abe2228a0947bd51460b435b0d5e7077ba9082478e341f7fc14bb55f6609600a81f87197687d484d8cb35c7980330d3e645d2fbaa