Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 14:17

General

  • Target

    d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587.exe

  • Size

    25KB

  • MD5

    ac7849de3120a3ddb72af08bd426a8bd

  • SHA1

    904eb51be8d1bf8e4b7df4bcb623676fe9fa113e

  • SHA256

    d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587

  • SHA512

    301ffd3a4b2696df8ca9b43929438e5b74c73fcce52122046b5fe693c71ad8332d379f294a0075254ca68d144cd64bf4cffcd2ec2e26fd75345fa6ba6f70f291

  • SSDEEP

    384:tlT/W+52Y+nyDGJp7oFtwcp/mDpQjlp0huQSNyPVbkTtnJWAEJc3ziJ:tlTf8Y+yiJp7oQkK28VghJWAEC38

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587.exe
    "C:\Users\Admin\AppData\Local\Temp\d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628546.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1344
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628546.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2100
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4944
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628546.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628546.html
        3⤵
        • Modifies Internet Explorer settings
        PID:2556
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628635.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628635.html
        3⤵
        • Modifies Internet Explorer settings
        PID:5016
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628635.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3272
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628635.html
        3⤵
        • Modifies Internet Explorer settings
        PID:4528
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\_zh.bat
      2⤵
        PID:1392

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_zh.bat

            Filesize

            248B

            MD5

            f4550899a106e7b10b4365ac6231308f

            SHA1

            c6a1482896918945e43f11eb29fc7a26649dd3b5

            SHA256

            03c2e0514b45d4e7cb5d18b32e8e2e14072c37d2074e3d6f6dbd766c1ebffdf7

            SHA512

            622cdf7732b8288fecff0128669bc090a7b6695a4e2a18aa4b69a23c4c47a8675c29710c9fc6eb373140a86e131e6d77413deac887f3a3e8b390ee566ac121f2

          • C:\Windows\SysWOW64\tarpurd32.dll

            Filesize

            44KB

            MD5

            314820a6faa4adb2a3a7c010cbecf373

            SHA1

            0822004226f7b4faf64c1fda9eeb8f43840baeec

            SHA256

            a88ed841f678b1f6d3aec197ca9b3b909bd5c03fab7b48b2217d7249419175c6

            SHA512

            4354745bc3e00b0906dc3902edff9cab332e45c087ac4e0a9f5a5b164e520932ef430ce9b1d340b66131963d6dc945defcf5aaeda1f75ffb92a6cf6ea78189e0

          • memory/4172-132-0x0000000000400000-0x0000000000417000-memory.dmp

            Filesize

            92KB

          • memory/4172-137-0x0000000000400000-0x0000000000417000-memory.dmp

            Filesize

            92KB