Analysis

  • max time kernel
    154s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 20:44

General

  • Target

    e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll

  • Size

    946KB

  • MD5

    68cf656c0e8e869707725e5918cd2b94

  • SHA1

    be5be1c39411016e7ef2a1d1a7d0fec04f965af3

  • SHA256

    e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134

  • SHA512

    11b00eba0191f8e1b6b42c17efb56ec9da1859f4cca688f9433d7343b3a0e20e06177616d9c84215e89869316e8dcb7ff950b2d8ca525678c50c6962e89e15d5

  • SSDEEP

    24576:rp81j8Ey3dNOP7wv1APccrX2HaFQc7CAK5e865DtYZI6:uj8Ey3dgw9APccrX2HaFQc2/oDYZ

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3524
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e47e7cb86382596896f7c854bcde33dc7beaa4806ca2414228aa0bd049ed2134.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4584
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v ygh /d "regsvr32 /s """C:\Users\Admin\AppData\Roaming\GBQHURCC.jpg"""" /f
          4⤵
          • Adds Run key to start application
          PID:3784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads