Analysis

  • max time kernel
    134s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 05:33

General

  • Target

    $PLUGINSDIR/resetExp.dll

  • Size

    88KB

  • MD5

    59f2ed4d0afbd916fa45586008a66db5

  • SHA1

    19eec3d465b55893007dc3094904e3b95a6e564d

  • SHA256

    09932a341dc73c05c69f6c7fbe22e13961c6b35871a39dfe41d0666b2f52e21b

  • SHA512

    33b1d75e2891fd2e5d9789c0f0536b68d019b3f7ecd5626d8d63fc54f61b904ef87dd4d3d5a286943cdedf3f1e5fb6896911ddb848b460bb195ad65d2e1df4d3

  • SSDEEP

    1536:9qwJ5B4RcM4ciXoQROER6c4I0LfAb76IEPJJ51V5WWJzDkkJe9:15CgciXoG5Ac4I0LfAb76IExJDTjzDkh

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\resetExp.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\resetExp.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1196
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1196-0-0x00000000001B0000-0x00000000001CB000-memory.dmp

    Filesize

    108KB

  • memory/2504-1-0x0000000004340000-0x0000000004341000-memory.dmp

    Filesize

    4KB

  • memory/2504-2-0x0000000004340000-0x0000000004341000-memory.dmp

    Filesize

    4KB

  • memory/2504-6-0x00000000025E0000-0x00000000025F0000-memory.dmp

    Filesize

    64KB