Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 05:52

General

  • Target

    580f4a40228c7e0504e6d2ebb95f8444.dll

  • Size

    18KB

  • MD5

    580f4a40228c7e0504e6d2ebb95f8444

  • SHA1

    7948532f0bb599b0f14c14b2f40661457ccc206d

  • SHA256

    81782985deb4b042c822a24229af1aee9355cd0d0da41537f2508cb42af1851c

  • SHA512

    baf78fa9a2ab15f5a4102d8bac99689f033bf9a7ddf57f93d901978354a85fea4430906234f24a1f490a7b27f9ed9bc534a6cafc243f37dfa913e6a750124ef6

  • SSDEEP

    384:aF2PI1HX0nBuih57ICBDRQ90JEQYrrohHBWfsw9Y7z:aFQI1Hm5cCByrQwo3wm

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Blocklisted process makes network request 20 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 40 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\580f4a40228c7e0504e6d2ebb95f8444.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:788
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\580f4a40228c7e0504e6d2ebb95f8444.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:1808
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:232
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3780
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:82950 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2212
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:82954 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4052
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:82958 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3140
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:82964 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1100
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:82970 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1452
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:82980 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3168
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:82984 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:800

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1RIAF1U2\background_gradient[1]

            Filesize

            453B

            MD5

            20f0110ed5e4e0d5384a496e4880139b

            SHA1

            51f5fc61d8bf19100df0f8aadaa57fcd9c086255

            SHA256

            1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b

            SHA512

            5f52c117e346111d99d3b642926139178a80b9ec03147c00e27f07aab47fe38e9319fe983444f3e0e36def1e86dd7c56c25e44b14efdc3f13b45ededa064db5a

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1RIAF1U2\suggestions[1].en-US

            Filesize

            17KB

            MD5

            5a34cb996293fde2cb7a4ac89587393a

            SHA1

            3c96c993500690d1a77873cd62bc639b3a10653f

            SHA256

            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

            SHA512

            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\SB302YPZ\ErrorPageTemplate[1]

            Filesize

            2KB

            MD5

            f4fe1cb77e758e1ba56b8a8ec20417c5

            SHA1

            f4eda06901edb98633a686b11d02f4925f827bf0

            SHA256

            8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f

            SHA512

            62514ab345b6648c5442200a8e9530dfb88a0355e262069e0a694289c39a4a1c06c6143e5961074bfac219949102a416c09733f24e8468984b96843dc222b436

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UG0DPB4T\bullet[1]

            Filesize

            447B

            MD5

            26f971d87ca00e23bd2d064524aef838

            SHA1

            7440beff2f4f8fabc9315608a13bf26cabad27d9

            SHA256

            1d8e5fd3c1fd384c0a7507e7283c7fe8f65015e521b84569132a7eabedc9d41d

            SHA512

            c62eb51be301bb96c80539d66a73cd17ca2021d5d816233853a37db72e04050271e581cc99652f3d8469b390003ca6c62dad2a9d57164c620b7777ae99aa1b15

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UG0DPB4T\errorPageStrings[1]

            Filesize

            4KB

            MD5

            d65ec06f21c379c87040b83cc1abac6b

            SHA1

            208d0a0bb775661758394be7e4afb18357e46c8b

            SHA256

            a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f

            SHA512

            8a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UG0DPB4T\navcancl[1]

            Filesize

            2KB

            MD5

            4bcfe9f8db04948cddb5e31fe6a7f984

            SHA1

            42464c70fc16f3f361c2419751acd57d51613cdf

            SHA256

            bee0439fcf31de76d6e2d7fd377a24a34ac8763d5bf4114da5e1663009e24228

            SHA512

            bb0ef3d32310644285f4062ad5f27f30649c04c5a442361a5dbe3672bd8cb585160187070872a31d9f30b70397d81449623510365a371e73bda580e00eef0e4e

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W8BIYKF7\A3BNJNOJ.htm

            Filesize

            495B

            MD5

            611aed59b07c531bf8504bce770925e6

            SHA1

            760dba9ab2b733398ea29136a739489cd341d489

            SHA256

            3e8ff577ece83269a4177f71e17ea746d3cc3042025f35d0e875ae836675b7e0

            SHA512

            5cd0ac4433f6711e2f6719ea2a0072d4bf1bd87b1b93b8e9218b771a0aed377173dbf256ddb74c83736007abac042945790ec2a8d6fee3978721abc1a7f9116b

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W8BIYKF7\httpErrorPagesScripts[2]

            Filesize

            11KB

            MD5

            9234071287e637f85d721463c488704c

            SHA1

            cca09b1e0fba38ba29d3972ed8dcecefdef8c152

            SHA256

            65cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649

            SHA512

            87d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W8BIYKF7\info_48[1]

            Filesize

            4KB

            MD5

            5565250fcc163aa3a79f0b746416ce69

            SHA1

            b97cc66471fcdee07d0ee36c7fb03f342c231f8f

            SHA256

            51129c6c98a82ea491f89857c31146ecec14c4af184517450a7a20c699c84859

            SHA512

            e60ea153b0fece4d311769391d3b763b14b9a140105a36a13dad23c2906735eaab9092236deb8c68ef078e8864d6e288bef7ef1731c1e9f1ad9b0170b95ac134

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W8BIYKF7\px[1].js

            Filesize

            476B

            MD5

            d2183968f9080b37babfeba3ccf10df2

            SHA1

            24b9cf589ee6789e567fac3ae5acfc25826d00c6

            SHA256

            4d9b83714539f82372e1e0177924bcb5180b75148e22d6725468fd2fb6f96bcc

            SHA512

            0e16d127a199a4238138eb99a461adf2665cee4f803d63874b4bcef52301d0ecd1d2eb71af3f77187916fe04c5f9b152c51171131c2380f31ca267a0a46d2a42

          • C:\Users\Admin\AppData\Local\Temp\~DF6185C6009F603764.TMP

            Filesize

            16KB

            MD5

            dc53707a811de36b345dd0f247917997

            SHA1

            8f106b1c55d8ffc22c46800fdb6d40c75026f82a

            SHA256

            44ee2c037bc9ea176fabb0d1544ce490ba8081f9815106a67ba1187dbc66920c

            SHA512

            482c6358d6307b2f6e8875091e64fec5423e789a3df6e18f0df6c8b24ea530ff36a1a6497647a5093cca0eb0d9fb2190bd592d91613273113f3e329bde6eab69

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

            Filesize

            3KB

            MD5

            196acd403d281edccb50e60a588e21bb

            SHA1

            10415a7856d03d3fe1b3e213d3d05f80fcaf8cd8

            SHA256

            5622bd58100b4bcc80fe91f240ef8896e8ada739d425671cd0ea7e5568431159

            SHA512

            2e298ab7ccf3de5101a37255683e0e60a76c2f83a233aecbcb93542d4ec64b96f23e81ea202cc0d4f88680c355a4a29feb561c3fa530f49b13853e588c7e0509

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

            Filesize

            3KB

            MD5

            2b0eb04d6a319886307f684088b3e385

            SHA1

            b823229e1acd0c091da30190224a71dc8e86def8

            SHA256

            4a94f4ea9c8e8db52993b8a680ccb0280e95db7f0c7729cc55ecf6b1b2b0a198

            SHA512

            ea4b9664d6562d74778f705bd3d46d6a9d777e5483c8a8430046a61afe693556d823a729487f76a774f52d7c7b040f3d284059a719dd317a5443d43cbd36de37

          • memory/1808-58-0x00000000007F0000-0x00000000007F1000-memory.dmp

            Filesize

            4KB

          • memory/1808-57-0x0000000010000000-0x0000000010005000-memory.dmp

            Filesize

            20KB

          • memory/1808-0-0x0000000010000000-0x0000000010005000-memory.dmp

            Filesize

            20KB

          • memory/1808-4-0x00000000007F0000-0x00000000007F1000-memory.dmp

            Filesize

            4KB

          • memory/1808-1-0x0000000010010000-0x000000001001C000-memory.dmp

            Filesize

            48KB