Analysis

  • max time kernel
    91s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 15:30

General

  • Target

    9d42c1939edb4cea86a7aa6eec6d12dc00e6c17418b799f01a74c1c5ffc7ae35.dll

  • Size

    19KB

  • MD5

    0abed0e339a2cd20d98103bd03e0608c

  • SHA1

    e76369e5ae80aa1810bc2b6bbc60f20fd1334485

  • SHA256

    9d42c1939edb4cea86a7aa6eec6d12dc00e6c17418b799f01a74c1c5ffc7ae35

  • SHA512

    2070dc934ecb1f6246d3d98da52a4fec24a87f567426e79871368e68b16db92c37db2c2c3e2bdba944ba1a731d0270c0218cf97b1aa92fa0a6eab1621af6c03c

  • SSDEEP

    384:ZRdCyfMqlW6DmQmENJoQjVDTkfUhkX7Y+aAzXgyB:xCyUql5DmQTDyUhkX7YSQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9d42c1939edb4cea86a7aa6eec6d12dc00e6c17418b799f01a74c1c5ffc7ae35.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9d42c1939edb4cea86a7aa6eec6d12dc00e6c17418b799f01a74c1c5ffc7ae35.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "http://www.ecartooes.com/img/feliz_natal/mensagem_boas_festas.jpg"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5024
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" "http://www.ecartooes.com/img/feliz_natal/mensagem_boas_festas.jpg"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4976
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2100

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          f8f8086f87156d14091b152fcaadc3ce

          SHA1

          fe3cfbf9e2e871c948300473593dfcf189013386

          SHA256

          8d92f28b70ed5265fafad8b37ce049b0b8ecad038745173acc35a21b8222bf56

          SHA512

          1235be77513694a1478459e999631920be42183a6993dc1f93333831eaa54ea60c7d8617029289c95fed2f861fc7aa79da551c128df4428d23752044eb68ba7a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          434B

          MD5

          337dc9590247965c845529171d27f6ea

          SHA1

          43b52f1e250a1a0c93555f38dc5349d9aad495f7

          SHA256

          0513989ec01963201d9a166d0c038528ef61609401632414e093a2d1132794fc

          SHA512

          6080e00976c0a0042b9d792810fd3692849f00d69021cd4ad21aaf00c86bfa8e4fa9dca80e78fcff3065358e585f0b322b2f87154b6e4e592fa9237731f566d1