Analysis

  • max time kernel
    139s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2023 11:57

General

  • Target

    6b1a9d76f3baa944f8570dc96.dll

  • Size

    140KB

  • MD5

    11ece72810c171174bf523e8a6d3d7ee

  • SHA1

    e8f224fc3f34758bec69249dbd437a828b06fda0

  • SHA256

    6b1a9d76f3baa944f8570dc9612fcb24c519f3cfc3098dc590d2618297b99e7f

  • SHA512

    325124b64cdb439065f161d8f342e0cd833a2f58fb021c3763cf82198e6598b178ccbb45f9d5f31f74bc303b9a0da17dbece68c6edacf32b53cce92c56ae371c

  • SSDEEP

    3072:MtR1csuBZgfAZoHd3O5pwHtZ48U11rF3:MtDVXfWJwr4t1r

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 63 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6b1a9d76f3baa944f8570dc96.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6b1a9d76f3baa944f8570dc96.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe C:\Users\Admin\AppData\Local\Temp\mDNAhMmqkC\mDNAhMmqkC
        3⤵
          PID:2904
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe C:\Users\Admin\AppData\Local\Temp\mDNAhMmqkC\mDNAhMmqkC
          3⤵
            PID:1340
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4696
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3352
        • C:\Windows\System32\rundll32.exe
          "C:\Windows\System32\rundll32.exe" inetcpl.cpl,LaunchConnectionDialog
          2⤵
            PID:3536
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:3976

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

            Filesize

            28KB

            MD5

            1552dbaa2f7a2ec26739641901cb4fa7

            SHA1

            0451cd60bc7de5f1d5eb4ab56648fd6506eb95b4

            SHA256

            3372b5f17fd2f811f47be62a53c615ccfbf2297f05023591bd4f020f008db67f

            SHA512

            0ebcbde8ffcbf5ea28006fe3a3d8cd82198c28518c9523f9e0f21eb98b0cf56eda371943a6f9254d32b709c2970ae52afcdb11aa07067987d52923216e365199

          • C:\Users\Admin\AppData\Local\Temp\mDNAhMmqkC\mDNAhMmqkC\mDNAhMmqkC1.lnk

            Filesize

            1KB

            MD5

            977466d72db7bdb86eb5352353b9ebd6

            SHA1

            d17706f41679851d1ffe7e49fccf1fc62be1d1fe

            SHA256

            e1494251ff38cd6c4953d92c0220075bf9d9ea1b0a65f75ca382ed1be5aa29b3

            SHA512

            78cb6376b821129094ab1875f0f888bff6fe5ababde52f964865df9c6f93961bc01b7784f0d5c644dbcd58e04424e67c769e7ecc56b031f21063b3fd374b74ec

          • C:\Users\Admin\AppData\Local\Temp\mDNAhMmqkC\mDNAhMmqkC\mDNAhMmqkC2.lnk

            Filesize

            1KB

            MD5

            2e784f2be789180c0e8bc16b4ea3017f

            SHA1

            8cba92bbe228488b8b8d091a1e5149acc318e6e8

            SHA256

            475787ebbcffa95198d4d0e5802e5c77b0e16bba14bf3fa6598a7b0a528f2af6

            SHA512

            64538d661a08a259d55d653cc98c6d626d716f39f70e50dd3c4b9807d68ea8c3f579ec0f4621bdd75ddb38116f7b93966560f87180757726d2572a178157ecd0

          • C:\Users\Admin\AppData\Local\Temp\mDNAhMmqkC\mDNAhMmqkC\mDNAhMmqkC3.lnk

            Filesize

            1KB

            MD5

            4dcfb12e5f3624d1295c6d4cd2362123

            SHA1

            3c084c22b005e10759e00338e51263903149455c

            SHA256

            c6d29184e08a5d97e6d58f3bbbdc3500376fe38da16478702bd3e809bd4e923d

            SHA512

            6867cedf72995caff714aa267bebb46aee34c5e5de57ad731510f1fd48d7a37a719f38d1e5a5d451b0ec14facb29c62c1f4eec540f3fc4785cb6ad7bedc98063

          • C:\Users\Admin\AppData\Local\Temp\mDNAhMmqkC\mDNAhMmqkC\mDNAhMmqkC4.lnk

            Filesize

            1KB

            MD5

            4dcfb12e5f3624d1295c6d4cd2362123

            SHA1

            3c084c22b005e10759e00338e51263903149455c

            SHA256

            c6d29184e08a5d97e6d58f3bbbdc3500376fe38da16478702bd3e809bd4e923d

            SHA512

            6867cedf72995caff714aa267bebb46aee34c5e5de57ad731510f1fd48d7a37a719f38d1e5a5d451b0ec14facb29c62c1f4eec540f3fc4785cb6ad7bedc98063

          • C:\Users\Admin\AppData\Local\Temp\mDNAhMmqkC\mDNAhMmqkC\mDNAhMmqkC5.lnk

            Filesize

            1KB

            MD5

            4e7fa50e3540c75e9fe6cf2e8392c19a

            SHA1

            5485b2750df1daad6b45501da4890599a91d745b

            SHA256

            7dbef112d4db78c8467e44d242b6f93336732c524c8aa62aad2c72ecfdee8a96

            SHA512

            83d889fcc2b35f332af957a0dd9f0532281d397b7d0d0f4274c9a634b9446735130266d5e0fc1ba7230c698c01763ade0532e98990abb156daee96dca4717d42