Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 04:34
Static task
static1
Behavioral task
behavioral1
Sample
0e9fa391b449719565a188b51105913a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e9fa391b449719565a188b51105913a.dll
Resource
win10v2004-20231215-en
General
-
Target
0e9fa391b449719565a188b51105913a.dll
-
Size
169KB
-
MD5
0e9fa391b449719565a188b51105913a
-
SHA1
845b9d1b5d2fcbf23333aa577cb18ccbaed3821b
-
SHA256
e9063e847f506e45000ee8f983b3db62bc19f2e7fa79edc18f7b8162b6dfe46c
-
SHA512
01a4f7b305e2fdae2b18dac6f6d29b74299dc5e341e386b912df5f7dc5deb0de1c97e821abf9a9a7b80ef74d296c95b7775e5df26319f1639ccf5390bada72e9
-
SSDEEP
3072:h58nVS9CNRMrdfbkqaX9y8lJupNO2hOtvncB4SMM99QmVK9yB4U:hmVMCTMrdbWQ8lJ4NO2hOtvLTm0yB
Malware Config
Signatures
-
Blocklisted process makes network request 9 IoCs
Processes:
rundll32.exeflow pid process 2 2104 rundll32.exe 3 2104 rundll32.exe 4 2104 rundll32.exe 5 2104 rundll32.exe 6 2104 rundll32.exe 8 2104 rundll32.exe 9 2104 rundll32.exe 10 2104 rundll32.exe 11 2104 rundll32.exe -
Deletes itself 1 IoCs
Processes:
rundll32.exepid process 2104 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2104 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
regsvr32.exerundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\Windows\\system32\\rundll32.exe C:\\PROGRA~3\\mnjsimwinaso.dat,StartAs" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\Windows\\system32\\rundll32.exe C:\\PROGRA~3\\mnjsimwinaso.dat,StartAs" rundll32.exe -
Drops file in Program Files directory 5 IoCs
Processes:
regsvr32.exerundll32.exedescription ioc process File created C:\PROGRA~3\mnjsimwinaso.dat regsvr32.exe File opened for modification C:\PROGRA~3\mnjsimwinaso.dat regsvr32.exe File created C:\PROGRA~3\osaniwmisjnm.dat regsvr32.exe File opened for modification C:\PROGRA~3\osaniwmisjnm.dat regsvr32.exe File opened for modification C:\PROGRA~3\osaniwmisjnm.dat rundll32.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
Processes:
rundll32.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" rundll32.exe -
Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" rundll32.exe -
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exerundll32.exepid process 1416 regsvr32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
regsvr32.exerundll32.exedescription pid process Token: SeDebugPrivilege 1416 regsvr32.exe Token: SeDebugPrivilege 2104 rundll32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
regsvr32.exeregsvr32.exerundll32.exedescription pid process target process PID 2004 wrote to memory of 1416 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1416 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1416 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1416 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1416 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1416 2004 regsvr32.exe regsvr32.exe PID 2004 wrote to memory of 1416 2004 regsvr32.exe regsvr32.exe PID 1416 wrote to memory of 1208 1416 regsvr32.exe Explorer.EXE PID 1416 wrote to memory of 2104 1416 regsvr32.exe rundll32.exe PID 1416 wrote to memory of 2104 1416 regsvr32.exe rundll32.exe PID 1416 wrote to memory of 2104 1416 regsvr32.exe rundll32.exe PID 1416 wrote to memory of 2104 1416 regsvr32.exe rundll32.exe PID 1416 wrote to memory of 2104 1416 regsvr32.exe rundll32.exe PID 1416 wrote to memory of 2104 1416 regsvr32.exe rundll32.exe PID 1416 wrote to memory of 2104 1416 regsvr32.exe rundll32.exe PID 2104 wrote to memory of 1208 2104 rundll32.exe Explorer.EXE PID 2104 wrote to memory of 1116 2104 rundll32.exe taskhost.exe PID 2104 wrote to memory of 1172 2104 rundll32.exe Dwm.exe PID 2104 wrote to memory of 1208 2104 rundll32.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0e9fa391b449719565a188b51105913a.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0e9fa391b449719565a188b51105913a.dll3⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\PROGRA~3\mnjsimwinaso.dat,StartAs4⤵
- Blocklisted process makes network request
- Deletes itself
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer Protected Mode Banner
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~3\mnjsimwinaso.datFilesize
384KB
MD554650d2ffd39ade8363f89bd5840c5e1
SHA1b631983d7281a11da39e866d79b139b103956b01
SHA25626af6676bd386cf11d3c44184f575b90912de93ad68fbf3ccfcfd5940c5c9346
SHA512f3d5cd1ce28c3e9d9635c3ef92fff696c3f379d948e60a49416cb4303e2abd5d56b7294f56bf5a9353b03623cf6e3ba750d9b703805e24e14eca239d98dd6dfc
-
C:\PROGRA~3\mnjsimwinaso.datFilesize
1.2MB
MD5ee8a7b97574c78c0a1870d6dc811d52d
SHA149696d1ad593328f83f5940a651b707045255543
SHA256fcff9d063373259cb91e8e9f05be97e6cc4534e9a2793b5b3e0a4b45ef83f610
SHA512494410c0c216485936656948e786a0ae9f40e9a3727f6456f2883860c9e30fd1c19179c679648f2d977f2da250cebeeaabc8a59313b3df9fa6a77a5bb2193a36
-
C:\PROGRA~3\osaniwmisjnm.datFilesize
93KB
MD5981a34b0fe8fc7b8cf314104f1faa213
SHA1547b845a7b00690ca757affd2ac6433bdf1ce093
SHA256753dd6fea80f0937f471c87f9e2be91d831296846ac4cba96064444e51b15b12
SHA51205accfba97ca50bf74a82f4774d8fd05e635cf1293798b8d2c6396089045a0e1052ace41acc1b295383b037a9cd59724a2b314db54255f2b3691b9c709c74f77
-
\PROGRA~3\mnjsimwinaso.datFilesize
365KB
MD5770262a9dd7568343b24f4ea64d7e69d
SHA1967ea21feab3941653f30cf18224f4a2988c80cd
SHA256373c14557d9ce3773c925f96dfb780602daf458e4b9041b76ee12c0194054394
SHA5128c2e44fdf499bced7b02b5d01313834a26a40e676c603edc425b06b64f1d6c8c93ea6144a6d62e8ac8a80be129bcd9ce3a9019aa2acbe2713e8b07fbb8f5cfcb
-
memory/1208-15-0x0000000002B00000-0x0000000002B01000-memory.dmpFilesize
4KB
-
memory/1416-2-0x0000000000700000-0x000000000072A000-memory.dmpFilesize
168KB
-
memory/1416-0-0x00000000008A0000-0x0000000000907000-memory.dmpFilesize
412KB
-
memory/1416-1-0x00000000008A0000-0x0000000000907000-memory.dmpFilesize
412KB
-
memory/1416-3-0x0000000002220000-0x0000000002288000-memory.dmpFilesize
416KB
-
memory/1416-16-0x00000000008A0000-0x0000000000907000-memory.dmpFilesize
412KB
-
memory/1416-4-0x00000000008A0000-0x0000000000907000-memory.dmpFilesize
412KB
-
memory/2104-19-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2104-21-0x0000000000350000-0x00000000003B8000-memory.dmpFilesize
416KB
-
memory/2104-25-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2104-46-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2104-67-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2104-91-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2104-102-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2104-112-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2104-125-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2104-137-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2104-157-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2104-181-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/2104-192-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB