Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 10:57

General

  • Target

    69159e7c584739a3c1433fb47e8ab07e.dll

  • Size

    104KB

  • MD5

    69159e7c584739a3c1433fb47e8ab07e

  • SHA1

    d160d165806a60d174edd1cdfd8cb80c78c74b3f

  • SHA256

    e52ed95bce26721b6665e4ad8edf20a2b87a89adc044b3d2df640694a9455e3b

  • SHA512

    fb84a33d1fe2c4a8c32aa94005d44b611402c67148f9f11d8876896b2a9215d46b66b3d62c36fc9c25315a541e8a91b43fc14482e4d9457debc7552bcca7da06

  • SSDEEP

    1536:fb1Mjs1cA/PPIKsunAN/KPf93kzvb427JmQ/UOVIZgZFUN+b56NB:t1DfIHunAVifG427EQ/USI6ZF1bY

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\SysWOW64\regsvr32.exe
    /s C:\Users\Admin\AppData\Local\Temp\69159e7c584739a3c1433fb47e8ab07e.dll
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1904
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\69159e7c584739a3c1433fb47e8ab07e.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files (x86)\Common Files\Display\DisplayWork.dll

    Filesize

    104KB

    MD5

    69159e7c584739a3c1433fb47e8ab07e

    SHA1

    d160d165806a60d174edd1cdfd8cb80c78c74b3f

    SHA256

    e52ed95bce26721b6665e4ad8edf20a2b87a89adc044b3d2df640694a9455e3b

    SHA512

    fb84a33d1fe2c4a8c32aa94005d44b611402c67148f9f11d8876896b2a9215d46b66b3d62c36fc9c25315a541e8a91b43fc14482e4d9457debc7552bcca7da06

  • memory/1904-3-0x00000000001A0000-0x00000000001BB000-memory.dmp

    Filesize

    108KB