Analysis

  • max time kernel
    41s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2022 00:00

General

  • Target

    b568e22f971b242c2c6dc56db0cdfedf3b1fe446dedc221ba4062d4b34cc35d9.exe

  • Size

    423KB

  • MD5

    11fc813561fe852d0c857b7c466f2130

  • SHA1

    fb35ba1129d02e9115328ec9af826c184b0ea519

  • SHA256

    b568e22f971b242c2c6dc56db0cdfedf3b1fe446dedc221ba4062d4b34cc35d9

  • SHA512

    aa87bb9c2e9951e0ca0b61735cf33d523fa6543e584d831ae6648db11e598dbc5217e10b322c40e7a5ad887c9e6cdb35271a7aeffcd5eb33dddada3269ae8570

  • SSDEEP

    12288:FRHH+RW/SolDfb4FuWlD7JXu1GcWh7aKgq7UJ:Fdt/SGDcuWlD794+h7aB

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 13 IoCs
  • Modifies registry class 46 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b568e22f971b242c2c6dc56db0cdfedf3b1fe446dedc221ba4062d4b34cc35d9.exe
    "C:\Users\Admin\AppData\Local\Temp\b568e22f971b242c2c6dc56db0cdfedf3b1fe446dedc221ba4062d4b34cc35d9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\spted.dll",ExportFunc 1001
      2⤵
      • Sets DLL path for service in the registry
      • Loads dropped DLL
      PID:1144
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\wbem\IRJIT.dll",Export @install
      2⤵
      • Loads dropped DLL
      PID:1348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\spted.dll

    Filesize

    284KB

    MD5

    076711594cf048a56df8f039a4a9c0f5

    SHA1

    9eee7e5aaa4fe029c6c231b00e825609e4cd9473

    SHA256

    6b1140448d14a30c869b2edeba5d579d85536e13086ac2c4af5bbc25252d8f7a

    SHA512

    b63efea48d220383e9f972567189a9fd79a97d8b84da99593a0802c788f2e48615557bace91757d4b37142d0f139b0d7cbae6a5f0b2ee7c22a8e367a23cfe8c8

  • C:\Windows\SysWOW64\wbem\IRJIT.dll

    Filesize

    282KB

    MD5

    a88c9fdc32e6108f5e38ce7824d1725b

    SHA1

    f4a34d71b5fdf6ca82e1dcd2443b699c6d262335

    SHA256

    3d672cf8431bc8f6ab86841c977c581902cf6e023fbbfee3e58c5bba0d2a8bf5

    SHA512

    3d24f6f471cd9cdbe0e4d8dee55a172c52c96f7ac40f7782aabbe6b85567d586a83f8c6ede350628a7ff87d4d8fae20fa7ca8fd229d01b368aead16b593e045a

  • \Program Files (x86)\CoolWebsite\QuickLink.dll

    Filesize

    88KB

    MD5

    9802d32fd6432af38473453c9d3065f6

    SHA1

    e6a2a66766a504c24f72cf3c9bb8303e67286d2a

    SHA256

    7acf989fc8a6a7492b8b87e98af54c1e445f8356d24624af829dd3bbc7b97292

    SHA512

    49b4cafc80555d973ff4a047c4b0e205ca44720f8b6f5a64ed11d6cc0e8c83614830dba52f216fabc4618c7f3e71310d444e56bd2c56e6522984a98a162a9eee

  • \Program Files (x86)\CoolWebsite\QuickLink.dll

    Filesize

    88KB

    MD5

    9802d32fd6432af38473453c9d3065f6

    SHA1

    e6a2a66766a504c24f72cf3c9bb8303e67286d2a

    SHA256

    7acf989fc8a6a7492b8b87e98af54c1e445f8356d24624af829dd3bbc7b97292

    SHA512

    49b4cafc80555d973ff4a047c4b0e205ca44720f8b6f5a64ed11d6cc0e8c83614830dba52f216fabc4618c7f3e71310d444e56bd2c56e6522984a98a162a9eee

  • \Windows\SysWOW64\spted.dll

    Filesize

    284KB

    MD5

    076711594cf048a56df8f039a4a9c0f5

    SHA1

    9eee7e5aaa4fe029c6c231b00e825609e4cd9473

    SHA256

    6b1140448d14a30c869b2edeba5d579d85536e13086ac2c4af5bbc25252d8f7a

    SHA512

    b63efea48d220383e9f972567189a9fd79a97d8b84da99593a0802c788f2e48615557bace91757d4b37142d0f139b0d7cbae6a5f0b2ee7c22a8e367a23cfe8c8

  • \Windows\SysWOW64\spted.dll

    Filesize

    284KB

    MD5

    076711594cf048a56df8f039a4a9c0f5

    SHA1

    9eee7e5aaa4fe029c6c231b00e825609e4cd9473

    SHA256

    6b1140448d14a30c869b2edeba5d579d85536e13086ac2c4af5bbc25252d8f7a

    SHA512

    b63efea48d220383e9f972567189a9fd79a97d8b84da99593a0802c788f2e48615557bace91757d4b37142d0f139b0d7cbae6a5f0b2ee7c22a8e367a23cfe8c8

  • \Windows\SysWOW64\spted.dll

    Filesize

    284KB

    MD5

    076711594cf048a56df8f039a4a9c0f5

    SHA1

    9eee7e5aaa4fe029c6c231b00e825609e4cd9473

    SHA256

    6b1140448d14a30c869b2edeba5d579d85536e13086ac2c4af5bbc25252d8f7a

    SHA512

    b63efea48d220383e9f972567189a9fd79a97d8b84da99593a0802c788f2e48615557bace91757d4b37142d0f139b0d7cbae6a5f0b2ee7c22a8e367a23cfe8c8

  • \Windows\SysWOW64\spted.dll

    Filesize

    284KB

    MD5

    076711594cf048a56df8f039a4a9c0f5

    SHA1

    9eee7e5aaa4fe029c6c231b00e825609e4cd9473

    SHA256

    6b1140448d14a30c869b2edeba5d579d85536e13086ac2c4af5bbc25252d8f7a

    SHA512

    b63efea48d220383e9f972567189a9fd79a97d8b84da99593a0802c788f2e48615557bace91757d4b37142d0f139b0d7cbae6a5f0b2ee7c22a8e367a23cfe8c8

  • \Windows\SysWOW64\wbem\IRJIT.dll

    Filesize

    282KB

    MD5

    a88c9fdc32e6108f5e38ce7824d1725b

    SHA1

    f4a34d71b5fdf6ca82e1dcd2443b699c6d262335

    SHA256

    3d672cf8431bc8f6ab86841c977c581902cf6e023fbbfee3e58c5bba0d2a8bf5

    SHA512

    3d24f6f471cd9cdbe0e4d8dee55a172c52c96f7ac40f7782aabbe6b85567d586a83f8c6ede350628a7ff87d4d8fae20fa7ca8fd229d01b368aead16b593e045a

  • \Windows\SysWOW64\wbem\IRJIT.dll

    Filesize

    282KB

    MD5

    a88c9fdc32e6108f5e38ce7824d1725b

    SHA1

    f4a34d71b5fdf6ca82e1dcd2443b699c6d262335

    SHA256

    3d672cf8431bc8f6ab86841c977c581902cf6e023fbbfee3e58c5bba0d2a8bf5

    SHA512

    3d24f6f471cd9cdbe0e4d8dee55a172c52c96f7ac40f7782aabbe6b85567d586a83f8c6ede350628a7ff87d4d8fae20fa7ca8fd229d01b368aead16b593e045a

  • \Windows\SysWOW64\wbem\IRJIT.dll

    Filesize

    282KB

    MD5

    a88c9fdc32e6108f5e38ce7824d1725b

    SHA1

    f4a34d71b5fdf6ca82e1dcd2443b699c6d262335

    SHA256

    3d672cf8431bc8f6ab86841c977c581902cf6e023fbbfee3e58c5bba0d2a8bf5

    SHA512

    3d24f6f471cd9cdbe0e4d8dee55a172c52c96f7ac40f7782aabbe6b85567d586a83f8c6ede350628a7ff87d4d8fae20fa7ca8fd229d01b368aead16b593e045a

  • \Windows\SysWOW64\wbem\IRJIT.dll

    Filesize

    282KB

    MD5

    a88c9fdc32e6108f5e38ce7824d1725b

    SHA1

    f4a34d71b5fdf6ca82e1dcd2443b699c6d262335

    SHA256

    3d672cf8431bc8f6ab86841c977c581902cf6e023fbbfee3e58c5bba0d2a8bf5

    SHA512

    3d24f6f471cd9cdbe0e4d8dee55a172c52c96f7ac40f7782aabbe6b85567d586a83f8c6ede350628a7ff87d4d8fae20fa7ca8fd229d01b368aead16b593e045a

  • memory/1920-54-0x00000000763F1000-0x00000000763F3000-memory.dmp

    Filesize

    8KB