Analysis
-
max time kernel
157s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 08:14
Behavioral task
behavioral1
Sample
e1b861c1beb91fd79068f4b3b985df99243c23bd79099e473d81e0ab46f23b1f.dll
Resource
win7-20220901-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
e1b861c1beb91fd79068f4b3b985df99243c23bd79099e473d81e0ab46f23b1f.dll
Resource
win10v2004-20220812-en
7 signatures
150 seconds
General
-
Target
e1b861c1beb91fd79068f4b3b985df99243c23bd79099e473d81e0ab46f23b1f.dll
-
Size
57KB
-
MD5
e3d04d418b62e33becbbc6704fdc0463
-
SHA1
5513b311641323875f9fa9d9086ce0df4a0be0b1
-
SHA256
e1b861c1beb91fd79068f4b3b985df99243c23bd79099e473d81e0ab46f23b1f
-
SHA512
f9f1b61fcb29dbf92fa8a7493c853b897f7c25b4896b644dc3827c67d2ff9042529cd368fd7406e28565873109d6ba31bbe49e9e82d8214bbc31b71b9cc77832
-
SSDEEP
1536:c7M8UgyV68hb2sbsuj2fzT3GhoAWMEt1JLROb7VSA/:cQ8fycgLbdjezbGON19RON
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 10 1664 rundll32.exe 17 1664 rundll32.exe 27 1664 rundll32.exe 38 1664 rundll32.exe -
resource yara_rule behavioral2/memory/1664-133-0x0000000000010000-0x000000000003C000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4180 1664 WerFault.exe 80 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000915" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000915" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2213228323" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2213228323" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{AF355603-7546-11ED-B696-72E5C3FA065D} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 3472 IEXPLORE.EXE 3472 IEXPLORE.EXE 3472 IEXPLORE.EXE 3472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4260 wrote to memory of 1664 4260 rundll32.exe 80 PID 4260 wrote to memory of 1664 4260 rundll32.exe 80 PID 4260 wrote to memory of 1664 4260 rundll32.exe 80 PID 1664 wrote to memory of 1784 1664 rundll32.exe 85 PID 1664 wrote to memory of 1784 1664 rundll32.exe 85 PID 1664 wrote to memory of 1784 1664 rundll32.exe 85 PID 1784 wrote to memory of 1712 1784 iexplore.exe 86 PID 1784 wrote to memory of 1712 1784 iexplore.exe 86 PID 1712 wrote to memory of 3472 1712 IEXPLORE.EXE 87 PID 1712 wrote to memory of 3472 1712 IEXPLORE.EXE 87 PID 1712 wrote to memory of 3472 1712 IEXPLORE.EXE 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1b861c1beb91fd79068f4b3b985df99243c23bd79099e473d81e0ab46f23b1f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1b861c1beb91fd79068f4b3b985df99243c23bd79099e473d81e0ab46f23b1f.dll,#12⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 8563⤵
- Program crash
PID:4180
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3472
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 1664 -ip 16641⤵PID:5048