Analysis

  • max time kernel
    131s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 15:54

Errors

Reason
Machine shutdown

General

  • Target

    0fa0711d0f8c90b5f2aab38681977074905fd967d7857e5b02be0e6334360042.dll

  • Size

    115KB

  • MD5

    280092290910d3c1278c75e6f8fea3b0

  • SHA1

    1117c7b2a7daab01aff22ffa9b01691409f9d4f1

  • SHA256

    0fa0711d0f8c90b5f2aab38681977074905fd967d7857e5b02be0e6334360042

  • SHA512

    5d442eaf4d69eb04438d6b1382cf1e26f9e3b7883c14c05b578a78d79a53955a053d8faa4524e2da670466ad2633bc61d1387e904eb6bae9dad649f78b366ceb

  • SSDEEP

    3072:kjdM0p+WA39lD0uArty4WGdnbAhH2qUrvSUzqqEHtAl:6+b9muARLuHtUbBqBg

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0fa0711d0f8c90b5f2aab38681977074905fd967d7857e5b02be0e6334360042.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0fa0711d0f8c90b5f2aab38681977074905fd967d7857e5b02be0e6334360042.dll,#1
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\PROGRA~3\cljjbee.plz,GL300
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1352
        • C:\Windows\SysWOW64\regedit.exe
          "C:\Windows\regedit.exe" -s C:\PROGRA~3\eebjjlc.reg
          4⤵
          • Sets DLL path for service in the registry
          • Runs .reg file with regedit
          PID:2036
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1288
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1060
        • C:\Windows\system32\ctfmon.exe
          ctfmon.exe
          4⤵
            PID:760
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:452
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x574
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1964
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x1
        1⤵
          PID:2016

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\PROGRA~3\cljjbee.plz

          Filesize

          115KB

          MD5

          280092290910d3c1278c75e6f8fea3b0

          SHA1

          1117c7b2a7daab01aff22ffa9b01691409f9d4f1

          SHA256

          0fa0711d0f8c90b5f2aab38681977074905fd967d7857e5b02be0e6334360042

          SHA512

          5d442eaf4d69eb04438d6b1382cf1e26f9e3b7883c14c05b578a78d79a53955a053d8faa4524e2da670466ad2633bc61d1387e904eb6bae9dad649f78b366ceb

        • C:\ProgramData\eebjjlc.reg

          Filesize

          279B

          MD5

          6ab8236386949c7e39bdbb0affc8f53a

          SHA1

          7b4372bbf2f512d2f4c77e282cf5dc4726313012

          SHA256

          c792d2deb5260fc601e007c845137529d09ccf551bc3027cb3c6b38ea8ccb90e

          SHA512

          005a75c1dcbb7e3c5379f1f3de02da18998eabe238a7ec5501d096fa9459608848350834b591ec568321e9c58e3ca0bbed756a5f09abae1452d64c68d1bb91fd

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LIYFIJU1.txt

          Filesize

          601B

          MD5

          c1fd2d0c2d786ee58bb110e22de3fa77

          SHA1

          86e5ac7c4cb0b8444d767fe929b91fefead8cf02

          SHA256

          34cad6b2709ed8b0071abdd7573e59e58ce7a4c4cdb91e6bea1642a609dba81a

          SHA512

          5676e679e70ebf3b2e8d5bafc70b474355e42e9f213d9aea33d027f08172facd9db3b63c78e75d592f703d154fa0ea7d606c2146907cf7d8ea4e77c658fd24f2

        • \PROGRA~3\cljjbee.plz

          Filesize

          115KB

          MD5

          280092290910d3c1278c75e6f8fea3b0

          SHA1

          1117c7b2a7daab01aff22ffa9b01691409f9d4f1

          SHA256

          0fa0711d0f8c90b5f2aab38681977074905fd967d7857e5b02be0e6334360042

          SHA512

          5d442eaf4d69eb04438d6b1382cf1e26f9e3b7883c14c05b578a78d79a53955a053d8faa4524e2da670466ad2633bc61d1387e904eb6bae9dad649f78b366ceb

        • memory/452-75-0x000007FEFB761000-0x000007FEFB763000-memory.dmp

          Filesize

          8KB

        • memory/1352-67-0x0000000074690000-0x00000000746C3000-memory.dmp

          Filesize

          204KB

        • memory/1352-64-0x0000000074690000-0x00000000746C3000-memory.dmp

          Filesize

          204KB

        • memory/1352-69-0x0000000074690000-0x00000000746C3000-memory.dmp

          Filesize

          204KB

        • memory/1352-76-0x0000000074690000-0x00000000746C3000-memory.dmp

          Filesize

          204KB

        • memory/1980-68-0x00000000747E0000-0x0000000074813000-memory.dmp

          Filesize

          204KB

        • memory/1980-59-0x00000000747E0000-0x0000000074813000-memory.dmp

          Filesize

          204KB

        • memory/1980-56-0x00000000747E0000-0x0000000074813000-memory.dmp

          Filesize

          204KB

        • memory/1980-55-0x00000000754E1000-0x00000000754E3000-memory.dmp

          Filesize

          8KB