Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2024, 22:26

General

  • Target

    3f2e5dc1577272631b4aab78a69c9773.exe

  • Size

    444KB

  • MD5

    3f2e5dc1577272631b4aab78a69c9773

  • SHA1

    833dca8aefccc77225dd33ae4d455da1c99bf87e

  • SHA256

    dec9ce65ecb493235ee4eb870ba1300e0a4f5aba4b762f3b1b22cf5001b77ca3

  • SHA512

    e33d0d9c61e0d382c8f38fef52a321563d72d49ccb8705111c0eba380e5e64ec04d413353d86ebcb1a365ccda79183cf0bbb9164a6644c826c3030e9cd758d0b

  • SSDEEP

    12288:mxTNNB1ZaeBLKwThUrYkPYPzIeyKTYG9UNjwvHKctfI5+CK0:EXB1ZaeBv6VPYPvTP9+wf/tfO+C

Malware Config

Signatures

  • Blocklisted process makes network request 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f2e5dc1577272631b4aab78a69c9773.exe
    "C:\Users\Admin\AppData\Local\Temp\3f2e5dc1577272631b4aab78a69c9773.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Windows\SysWOW64\Rundll32.exe
      C:\Windows\system32\Rundll32.exe C:\Windows\system32\impor.dll Start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Adds Run key to start application
      PID:824
    • C:\Users\Admin\AppData\Local\Temp\host.exe
      "C:\Users\Admin\AppData\Local\Temp\\host.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      PID:2460

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\zzToolBar\ToolBand.dll

          Filesize

          92KB

          MD5

          ada8fc21795d871f08b5d4274530c998

          SHA1

          6cc796c4e25752d091d3aec610b225675a0334a6

          SHA256

          28089ba7bef8126ff2fcf7153ea22ea89ce4e27743bf8b9bc59c9783b4e50e8b

          SHA512

          38e654784fa1060fcc15a19f0e40075a137702c1bd6cfe43f45c0c6a3ce13a4e065b5ae56063e265f8ec3c6ed7712a8b25fec7a960e220a24353d45d65bfa70f

        • C:\Program Files (x86)\zzToolBar\Toolbar_bho.dll

          Filesize

          113KB

          MD5

          da93f7f100ab0666b8732cb7b2039d60

          SHA1

          9faf42ec2861e04d881f3e9ce4d24c8080237c13

          SHA256

          7100af51580516e2a8af29e91d7216e9c129d5a6670b94aa246d5fbb95e0f5f3

          SHA512

          626e9c4d6c820455043c4b331d0f3551a3c893456bb225498b199b0ca753997e7fa6a0aaa466a0c3f9df9ec6731ae4231e24112e17981288ccea8631c1e488e0

        • C:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\Processes.dll

          Filesize

          35KB

          MD5

          2cfba79d485cf441c646dd40d82490fc

          SHA1

          83e51ac1115a50986ed456bd18729653018b9619

          SHA256

          86b302fa9c85dfa0c1c03ba000864a928365dab571f3355347dba02da22949b7

          SHA512

          cca186a7f9c5cff3f4eca410fbe8cc13dad2514a7e36aec9b1addfbcb239ace9b9b2d8427771858e3fd11783abce7e24d43c286f98da9f8b17562ca095a4c043

        • C:\Windows\SysWOW64\impor.dll

          Filesize

          1KB

          MD5

          8270f3b892511a3098021147c7d7e387

          SHA1

          c93351b328a42e7e3794289478991eee7d585fef

          SHA256

          ab5e58df2359d916cbaedeb557cd9526004d01b06d38379c2063cde0b8528f41

          SHA512

          995854e7a25ad2be513af04c8a756646ae77cf39d9eb645cc7809faa9f85335e89f61e32a545e6ecb85c2fb75a5594cb2eaf47305b94cfa56a82cf9f0335d878

        • memory/824-36-0x0000000010000000-0x0000000010001000-memory.dmp

          Filesize

          4KB

        • memory/2264-0-0x0000000000400000-0x000000000046F160-memory.dmp

          Filesize

          444KB

        • memory/2264-35-0x0000000000400000-0x000000000046F160-memory.dmp

          Filesize

          444KB