Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 17:48

General

  • Target

    095b2d35bb4cfa60bae7a3e0170055e7.exe

  • Size

    4.0MB

  • MD5

    095b2d35bb4cfa60bae7a3e0170055e7

  • SHA1

    b3fc902702a09002c5ec52d79e5552b46cb2cae3

  • SHA256

    e893e4a945ccb508afc10e1a3ab94865c39b4b8ea568687f8f1d5db1f379f7cc

  • SHA512

    db2765e0530323684cce1bf9ebbe443701f5e4a7de9f4787306a50d1f36db98c855528fdaf4bf7318b10052141efae0098c3ae00e15c45210b6bcf1f75055ffb

  • SSDEEP

    98304:hxhDNrNI8hrbhiXxiklM6613LFNZarqh9nM9kShp8EanNUVu:xBr9FhiEuM66xLnZWqh1lST8EWUI

Malware Config

Signatures

  • Loads dropped DLL 46 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\095b2d35bb4cfa60bae7a3e0170055e7.exe
    "C:\Users\Admin\AppData\Local\Temp\095b2d35bb4cfa60bae7a3e0170055e7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /create /tn:"¹ÙÀÌ¿À¹é½Å ½ÇÇà" /xml "C:\Users\Admin\AppData\Local\Temp\test_saved.xml"
      2⤵
      • Creates scheduled task(s)
      PID:3084
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c \DelUS.bat
      2⤵
        PID:1424
    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
      1⤵
        PID:2704
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3912
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:17414 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4028

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\DelUS.bat

        Filesize

        200B

        MD5

        dd32d5bd843ebf6f68bb3b02131f1c73

        SHA1

        d86c00c8f520694099e313a78b2e056dac68b76c

        SHA256

        f11743d84471baf5346dee48ef18454a867a9181da85f4b8b2d13ee8d45ccd37

        SHA512

        1b6e1516466d88c6ccf8cb4ade2221f70fccb379aa928a8b2c8ef77de354b6f11b2ea28a30a44dfae7f7759eab83b6cc2b9f36c90010b52e0a5ed0fdaa736208

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\BioVaccineMsg.dll

        Filesize

        40KB

        MD5

        335671e40fbefdf790f60ce40b1ca201

        SHA1

        3dd91e4be67b46725c25bff9ba4a40be4ebcc797

        SHA256

        df7b2fb60fab3f70cdd548c0d7f504984794e6734a0fa96987fae329c8b90127

        SHA512

        f4f8fcdf0b148ff70047c851a7dd13107a2f34457b7dc3bb3e3fcb4179d94be38538ddb4031fb7b3c56b14891602ac463b677a11cbb68dc3fa72badc5194c712

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\DLLWaitForKillProgram.dll

        Filesize

        28KB

        MD5

        9c4b8ec42d89f7557bfd90798ce52787

        SHA1

        2376dde426ea65aa27c30e304086310605382475

        SHA256

        ed52bdad7b383a179b9b0e21fefdda2d72695c5263a815d5e1e0bfac6c718548

        SHA512

        17c12a27a08746755868558c037376dd7e20f03f0f71888c1329903b70975a54f57786c3c32bf88aaf30119f11ed978a6830ba91949e11cfc94fbb5ad95305b7

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\DLLWebCount_new.dll

        Filesize

        28KB

        MD5

        f16f5feebd9b431a8bc63456c0ad267c

        SHA1

        acc75cfa3ed7888334aa2ccf305a6c6c58a08aaf

        SHA256

        5417af0fc8284e9745650a55803bb34217e314096dc7cedf113c960624ae08ad

        SHA512

        ed1e62d903b511a29abd5def4419b5afa63699ee2d1c91a9d884ffb01d7debe5981559574cac4885140d1f27f4275be56236f5c6f1c327147dcac8893f965512

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\DLLWebCount_new.dll

        Filesize

        20KB

        MD5

        65f2fe7963240d3ea58694490e4f1820

        SHA1

        caf9b865b26d90c2d5f2fc6ae390cbfaa99726f2

        SHA256

        fd4aa298953b0fe29d73a76ab4631775a2e517cbf2ffe1a362b374576455b5e6

        SHA512

        4a00ae5c6b03196bc2c3433e6664797862332d96ebeccdfaab14af4f1d528bab3ae16c8cc675fe885a73d6a0f8017ab4472966daf978d3a0833628ba48ed72c1

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\IEFunctions.dll

        Filesize

        3KB

        MD5

        9701818d39318145dd164794ef3a3846

        SHA1

        7db701f8dc19163d46ba88e8b68d8dbf428a8152

        SHA256

        3122b0413f74e88518cfd1b9c6e18435dd326ca177a2374b6405df78f43e776a

        SHA512

        d92786630250e9eb6c47537b09684fa107f959b50d255c7f3952741eb438c3be47e171827d3a4407b049c33c12dad73f8ec381a7265b28a6d8ca101ff702e8a4

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\IsVista.dll

        Filesize

        44KB

        MD5

        344d13fd0fdd2d97e8d61960f40a8a30

        SHA1

        3f0f120203005eea3e8ed1652a6ea8a607ea934d

        SHA256

        17bb3331e2300aa01666fbee98b9552cec5e46212a4c5a340c0370b93df88f83

        SHA512

        b4e49c58503532e270cc369f1cbd14d85edd46da5ab034dad730bd4297887dd541d445d2fbf205820e6afbbdba7ab6d5b78b694467554320fd6db8e06fe4f719

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\KillProcDLL.dll

        Filesize

        36KB

        MD5

        6958016193a066833556992077bad4fe

        SHA1

        5f564945936f99381d7e2408f034f97d069005a4

        SHA256

        f38c669c87f2a73768a27a01622690997e9d93d5ca3830b349bd24c3ff9f8d2e

        SHA512

        fd6ab5c341b331b80c940ba97a2cd14547c796933a2df26d3dd87ede1602b86d9f8c37baebd7dd4c68d811199fc96a27ad4cb995bb8889d51af91db9f43ba0a7

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\SelfDelete.dll

        Filesize

        24KB

        MD5

        7bf1bd7661385621c7908e36958f582e

        SHA1

        43242d7731c097e95fb96753c8262609ff929410

        SHA256

        c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e

        SHA512

        8317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\UserMgr.dll

        Filesize

        55KB

        MD5

        130f66c0161e6da46744abe3c0be4d9c

        SHA1

        d2a44a0cd07bc0c5d81fc0d056d6d45d200896ed

        SHA256

        955705c8c7188d06af16849e5cc3ceae79ea5d0808cc2851630a54d54bbc01f2

        SHA512

        915b9135da230ec8d3016ba83bd7102b3f8cb13050189a176f8d4d50363f13584fb971226458bc493cd2df27723c8ab7273effab7d6c6e14d49e735d24d7fac8

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        cdff6b8f9523b6ef9f20fb5f9e90f1a5

        SHA1

        b25f6e0a19b41ff0a12de8e98e3005bc119d34fa

        SHA256

        80b2740fb3a21ffab022a96ce6b420019072f8ef3a048fd9dea4a5b64498c0c8

        SHA512

        62585c6a6103aed10f9a79c016df8cb630c3e37715542b5f26aa1a910771540c9b323ddbba3329db0ecf524143f7a27b782e198ce944317f764be6b9d04b792e

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\stack.dll

        Filesize

        10KB

        MD5

        0f61a81a543822de5fcb9a8a43f230dd

        SHA1

        d01d4a0f542f3c654637fdfe5a574fe1f150ece1

        SHA256

        46b4a72ae8590b0afb3304cc5c13db0502bc4c4cb02f64f37c79008c17db814f

        SHA512

        596b7a897ba64c32e26ba6168aa3628aad37b187a9814a286298307d8c42eabf8e8a679dbda558f8b2cdc8676c94ec819256432aa5ad7c05a5387759262a4402

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\xml.dll

        Filesize

        104KB

        MD5

        1e2caf86244409bd4a9ca23f61917141

        SHA1

        9cd9fb406ac1f87cb2709df15dafbfc4e80a523a

        SHA256

        0312d18d32f21304969f16b8c41fd297a0cbe3cfd837cacaa339d6f31723f9ab

        SHA512

        47e5010969ac99f5290eb6d3aaba82047df2854323763a7ccd45d2432d823a80dcb348b14fbc310bcd1e2a5914f444bf47fcf9a83b569dfe55c0093dc22b49fb

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\xml.dll

        Filesize

        113KB

        MD5

        0489cf1b25a3e1ec3fd666bf3a45154e

        SHA1

        ccaa7549bffee04d328c834771d3f2590675b93e

        SHA256

        85b6c445ef172d00349f567affcc3247a25140793480961c5132c206b5f5b36d

        SHA512

        8d596ea5896f2a5e1950f0f50915d2a4ec90d4786e65b6ac242e7aa0a6a8600d6ed5a6a84a27ea0925e0b25b662a77c38fff5905942d90ab74f99098ee11bc9c

      • C:\Users\Admin\AppData\Local\Temp\nsw56EB.tmp\xml.dll

        Filesize

        118KB

        MD5

        42df1fbaa87567adf2b4050805a1a545

        SHA1

        b892a6efbb39b7144248e0c0d79e53da474a9373

        SHA256

        e900fcb9d598643eb0ee3e4005da925e73e70dbaa010edc4473e99ea0638b845

        SHA512

        4537d408e2f54d07b018907c787da6c7340f909a1789416de33d090055eda8918f338d8571bc3b438dd89e5e03e0ded70c86702666f12adb98523a91cbb1de1d

      • C:\Users\Admin\AppData\Local\Temp\test_saved.xml

        Filesize

        1KB

        MD5

        884823c4188f40cfeb5c2c1005b5def5

        SHA1

        ad48cc437d2ad5a7d40e6d72e41dcc26ce398fce

        SHA256

        bdd82103e856c539cd8a33449fdd1c04a96fc842141dc71c0a03d8aff5e70c70

        SHA512

        108a193f5477830a8c618f59dba3dacd462a33b7d583766fe1fce0e9867521c9b2a6082a5e2690397a68483eb6f682577f41d683794a66ba72ec33e1a5e08c41

      • memory/2492-62-0x00000000022F0000-0x00000000022FA000-memory.dmp

        Filesize

        40KB

      • memory/2492-157-0x0000000002930000-0x0000000002951000-memory.dmp

        Filesize

        132KB

      • memory/2492-49-0x00000000022F0000-0x00000000022FC000-memory.dmp

        Filesize

        48KB

      • memory/2492-148-0x0000000002310000-0x000000000232E000-memory.dmp

        Filesize

        120KB