Analysis

  • max time kernel
    257s
  • max time network
    347s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2022, 02:57

General

  • Target

    dcb4ba36fce02ac50ff928a1bf51a4a3158d5d485b7be6d05bb2094fa0160bcd.dll

  • Size

    205KB

  • MD5

    9134cc95ac3688555f5ecd90c23fe57d

  • SHA1

    b91ba222d29113cb65fbb563ad6c6e34e099d7e8

  • SHA256

    dcb4ba36fce02ac50ff928a1bf51a4a3158d5d485b7be6d05bb2094fa0160bcd

  • SHA512

    ab596ae318a63fbc3ea2a7a945cd92e72c84a9828e9fcff42aa40e684ff2d92e6260a6e6ecc9ea7e489d8c99e451bcaf71d4ed6bb6c6e374a8f94b45647e34ad

  • SSDEEP

    6144:Qq2uOpxanDqZAn7KHFYvBOiG5zER+7O9:QZxpYPSFKIzP

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Protected Mode 1 TTPs 15 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 22 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\dcb4ba36fce02ac50ff928a1bf51a4a3158d5d485b7be6d05bb2094fa0160bcd.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:704
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\dcb4ba36fce02ac50ff928a1bf51a4a3158d5d485b7be6d05bb2094fa0160bcd.dll,#1
      2⤵
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe
        3⤵
          PID:1304
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          PID:1396
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1528
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" http://62.76.184.85/
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1628
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1252
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\Windows\system32\ctfmon.exe
        ctfmon.exe
        2⤵
        • Suspicious use of FindShellTrayWindow
        PID:1384
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1008 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2020

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9178A121-7994-11ED-92B7-4E1FE69E5DC1}.dat

            Filesize

            5KB

            MD5

            791311231a14774a853c212816d2817c

            SHA1

            b43f4224126d2b7d1f44ec869faec42e4f7cd93b

            SHA256

            99531d924683a98abfa5ec40600d9f0225c518a59eeb8d98c4d4a07bf5c41ce8

            SHA512

            38e21d54c05429ef00176126294593326ceb5f2e0823b7a32c46d6d9e65a8e64f9d991c33d008596f22b393b385cf66427ee09c87db2377fb6f7afdebf558533

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JVFKK248.txt

            Filesize

            608B

            MD5

            f3f5e521d7fcbe156aa9d21fe5933a27

            SHA1

            c2bd51af6b125cfbb277ec7d6ed8298d95b92f38

            SHA256

            562aa2710f12e02db897fef919bfcccce54f885330721eab84791aa8446b2081

            SHA512

            35def0c76b0be30da0d94296d13bfaa4ebc4418e2bbf1f58cc457b144f25748f5fd9cac4d406b2ae9738bb7500db7254f809d3a219f09ee757b516d2637414b1

          • memory/1304-67-0x0000000073FF1000-0x0000000073FF3000-memory.dmp

            Filesize

            8KB

          • memory/1396-81-0x0000000001E50000-0x0000000001E81000-memory.dmp

            Filesize

            196KB

          • memory/1396-72-0x0000000001E50000-0x0000000001E81000-memory.dmp

            Filesize

            196KB

          • memory/1396-71-0x0000000001DD0000-0x0000000001E06000-memory.dmp

            Filesize

            216KB

          • memory/1396-70-0x0000000001D90000-0x0000000001DC1000-memory.dmp

            Filesize

            196KB

          • memory/1496-62-0x00000000007A0000-0x00000000007D1000-memory.dmp

            Filesize

            196KB

          • memory/1496-80-0x00000000007A0000-0x00000000007D1000-memory.dmp

            Filesize

            196KB

          • memory/1496-55-0x0000000075151000-0x0000000075153000-memory.dmp

            Filesize

            8KB

          • memory/1496-59-0x00000000007A0000-0x00000000007D1000-memory.dmp

            Filesize

            196KB

          • memory/1496-60-0x00000000007A0000-0x00000000007D1000-memory.dmp

            Filesize

            196KB

          • memory/1496-58-0x00000000007A0000-0x00000000007D1000-memory.dmp

            Filesize

            196KB

          • memory/1496-56-0x00000000006A0000-0x00000000006D1000-memory.dmp

            Filesize

            196KB

          • memory/1496-61-0x00000000007A0000-0x00000000007D1000-memory.dmp

            Filesize

            196KB

          • memory/1496-57-0x00000000006E0000-0x0000000000716000-memory.dmp

            Filesize

            216KB

          • memory/1528-78-0x0000000000270000-0x00000000002A6000-memory.dmp

            Filesize

            216KB

          • memory/1528-76-0x0000000000720000-0x0000000000751000-memory.dmp

            Filesize

            196KB

          • memory/1528-75-0x0000000000230000-0x0000000000261000-memory.dmp

            Filesize

            196KB

          • memory/1528-82-0x0000000000230000-0x0000000000261000-memory.dmp

            Filesize

            196KB

          • memory/1528-83-0x0000000000720000-0x0000000000751000-memory.dmp

            Filesize

            196KB

          • memory/1528-84-0x0000000000720000-0x0000000000751000-memory.dmp

            Filesize

            196KB

          • memory/1544-77-0x0000000003A40000-0x0000000003A50000-memory.dmp

            Filesize

            64KB

          • memory/1544-68-0x000007FEFB531000-0x000007FEFB533000-memory.dmp

            Filesize

            8KB