Analysis
-
max time kernel
135s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 07:14
Behavioral task
behavioral1
Sample
cdc496a1bc0c2b99e7e267a51937e1b5191eab820e8985742b746c361b35be6c.dll
Resource
win7-20220812-en
General
-
Target
cdc496a1bc0c2b99e7e267a51937e1b5191eab820e8985742b746c361b35be6c.dll
-
Size
150KB
-
MD5
44cd3b5529f074b2baa39c5ac6f0748a
-
SHA1
10775048a2fe7c96107b353afa7cdb8a07187585
-
SHA256
cdc496a1bc0c2b99e7e267a51937e1b5191eab820e8985742b746c361b35be6c
-
SHA512
284a1c65f29b3f6fdd2dba9b1fa0de313e91143a1fbdc59b77d4bea53cba8a6148c2362431bde6f65cea0daeb8df73ff2482383bf98dc89171f2140cd9da6acb
-
SSDEEP
3072:28UWFHc46dYAaL3qHdkPh8DTe8LT1pfi3O9ZbVvjN8kj:28bFHcuLaHdqem8fiqVvjNTj
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0006000000022e5f-134.dat acprotect behavioral2/files/0x0006000000022e5f-135.dat acprotect -
resource yara_rule behavioral2/memory/4088-133-0x0000000010000000-0x0000000010053000-memory.dmp upx behavioral2/files/0x0006000000022e5f-134.dat upx behavioral2/files/0x0006000000022e5f-135.dat upx behavioral2/memory/4088-136-0x00000000011C0000-0x00000000011E3000-memory.dmp upx behavioral2/memory/4088-137-0x00000000011C0000-0x00000000011E3000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 4088 rundll32.exe 4088 rundll32.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9ED33AC7-9872-464F-AFD7-C44412921BE8} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\ = "Windows Web AntiVirus" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\NoExplorer = "1" rundll32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\nbwebsafe.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\tb.ico rundll32.exe File created C:\Windows\SysWOW64\tb.ico rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{96042B05-41F5-4344-BEE3-500478CE82F8}\DisplayName = "ÔÚ´ËËÑË÷..." rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{96042B05-41F5-4344-BEE3-500478CE82F8}\Codepage = "65001" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\Enabled = "0" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\SearchScopes rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\Version = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\PopupsUseNewWindow = "1" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\ShortcutBehavior = "0" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{96042B05-41F5-4344-BEE3-500478CE82F8}" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{96042B05-41F5-4344-BEE3-500478CE82F8}\URL = "http://www.baidu.com/baidu?tn=nbmagician_ql&word={searchTerms}&cl=3&ie=utf-8" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\WarnOnClose = "0" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\UseHomepageForNewTab = "1" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Check_Associations = "no" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\SearchScopes\{96042B05-41F5-4344-BEE3-500478CE82F8} rundll32.exe -
Modifies registry class 51 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}\1.0 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BillBoard.BillBoardBHO.1 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BillBoard.BillBoardBHO.1\ = "Windows Web AntiVirus" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BillBoard.BillBoardBHO\ = "Windows Web AntiVirus" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BillBoard.BillBoardBHO\CurVer rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\ = "Windows Web AntiVirus" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\ProgID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\VersionIndependentProgID rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\nbwebsafe.dll" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{59CE604A-1C58-4E6F-9F49-9C14F5FA2FDD} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BillBoard.BillBoardBHO.1\CLSID\ = "{9ED33AC7-9872-464F-AFD7-C44412921BE8}" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BillBoard.BillBoardBHO\CLSID\ = "{9ED33AC7-9872-464F-AFD7-C44412921BE8}" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BillBoard.BillBoardBHO\CurVer\ = "BillBoard.BillBoardBHO.1" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\ProxyStubClsid32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\TypeLib\ = "{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\TypeLib\Version = "1.0" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\ProgID\ = "BillBoard.BillBoardBHO.1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\AppID = "{59CE604A-1C58-4E6F-9F49-9C14F5FA2FDD}" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}\1.0\0 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED} rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}\1.0\HELPDIR rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\ = "IBillBoardBHO" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\TypeLib rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\ = "IBillBoardBHO" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BillBoard.BillBoardBHO rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\InprocServer32\ = "C:\\Windows\\SysWow64\\nbwebsafe.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\TypeLib\ = "{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BillBoard.BillBoardBHO.1\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\Programmable rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\TypeLib\Version = "1.0" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\ProxyStubClsid32 rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\InprocServer32\ThreadingModel = "Apartment" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}\1.0\ = "BillBoard 1.0 ÀàÐÍ¿â" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\TypeLib\ = "{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{59CE604A-1C58-4E6F-9F49-9C14F5FA2FDD}\ = "AntiVirus" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\AntiVirus.DLL rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BillBoard.BillBoardBHO\CLSID rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\VersionIndependentProgID\ = "BillBoard.BillBoardBHO" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\InprocServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9ED33AC7-9872-464F-AFD7-C44412921BE8}\TypeLib rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}\1.0\FLAGS\ = "0" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}\1.0\0\win32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\TypeLib rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\AntiVirus.DLL\AppID = "{59CE604A-1C58-4E6F-9F49-9C14F5FA2FDD}" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2EE49CEB-2DD3-40E8-AD1E-D17E9DAB65F6}\1.0\FLAGS rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D0852560-5F8B-472B-B1E1-1CEEECFAF9ED}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1424 wrote to memory of 4088 1424 rundll32.exe 79 PID 1424 wrote to memory of 4088 1424 rundll32.exe 79 PID 1424 wrote to memory of 4088 1424 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cdc496a1bc0c2b99e7e267a51937e1b5191eab820e8985742b746c361b35be6c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cdc496a1bc0c2b99e7e267a51937e1b5191eab820e8985742b746c361b35be6c.dll,#12⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:4088
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5d96891279495d565ba852b6615070316
SHA1a9612a47959124f1242278bb89b37a7c568125aa
SHA2567fd7dac892255b440672854730295b3ca69faefc600715a44ab930d7584fca00
SHA5120ed55d9270645c66ae84ae1d13a542b669c0bd5f7068f2db19c60ea880c6a4b25f708671027cc70a69233ae2af5c4d7f312c34d6bf471d81671f65cd05247448
-
Filesize
52KB
MD5d96891279495d565ba852b6615070316
SHA1a9612a47959124f1242278bb89b37a7c568125aa
SHA2567fd7dac892255b440672854730295b3ca69faefc600715a44ab930d7584fca00
SHA5120ed55d9270645c66ae84ae1d13a542b669c0bd5f7068f2db19c60ea880c6a4b25f708671027cc70a69233ae2af5c4d7f312c34d6bf471d81671f65cd05247448