Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 09:30
Static task
static1
Behavioral task
behavioral1
Sample
380232c4d78e4c015ab8469ff62c8f2d4d44f2ebbc3aca0baf26d785402d87dc.dll
Resource
win7-20240221-en
General
-
Target
380232c4d78e4c015ab8469ff62c8f2d4d44f2ebbc3aca0baf26d785402d87dc.dll
-
Size
353KB
-
MD5
c04f67210a558c26d0132036cb2d0c25
-
SHA1
5896f685f25d4908826960d5dd3e0e82ce2e00c1
-
SHA256
380232c4d78e4c015ab8469ff62c8f2d4d44f2ebbc3aca0baf26d785402d87dc
-
SHA512
825857f3e8020003cd6bf2acac6be61e3174be77ed9aeea77f8cfb6e277d601abdb575f84fac5df3683d225df9902e048a05c10254519170bf811e5917d9b2cd
-
SSDEEP
6144:O1HCQc7/p7NthksJroUcdp1bw/uu+eLDXfbrTrzDIPS0iYrp1Hfmn1T:O1HCQOTthksJroUmp1bw/5DXfbzz0PSn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2340 rundll32Srv.exe 1292 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 920 rundll32.exe 2340 rundll32Srv.exe -
resource yara_rule behavioral1/files/0x000c0000000133a4-3.dat upx behavioral1/memory/920-5-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1292-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2340-12-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px4A88.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1BF7B661-FC9D-11EE-8795-52ADCDCA366E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419508089" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1292 DesktopLayer.exe 1292 DesktopLayer.exe 1292 DesktopLayer.exe 1292 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2960 wrote to memory of 920 2960 rundll32.exe 28 PID 2960 wrote to memory of 920 2960 rundll32.exe 28 PID 2960 wrote to memory of 920 2960 rundll32.exe 28 PID 2960 wrote to memory of 920 2960 rundll32.exe 28 PID 2960 wrote to memory of 920 2960 rundll32.exe 28 PID 2960 wrote to memory of 920 2960 rundll32.exe 28 PID 2960 wrote to memory of 920 2960 rundll32.exe 28 PID 920 wrote to memory of 2340 920 rundll32.exe 29 PID 920 wrote to memory of 2340 920 rundll32.exe 29 PID 920 wrote to memory of 2340 920 rundll32.exe 29 PID 920 wrote to memory of 2340 920 rundll32.exe 29 PID 2340 wrote to memory of 1292 2340 rundll32Srv.exe 30 PID 2340 wrote to memory of 1292 2340 rundll32Srv.exe 30 PID 2340 wrote to memory of 1292 2340 rundll32Srv.exe 30 PID 2340 wrote to memory of 1292 2340 rundll32Srv.exe 30 PID 1292 wrote to memory of 2996 1292 DesktopLayer.exe 31 PID 1292 wrote to memory of 2996 1292 DesktopLayer.exe 31 PID 1292 wrote to memory of 2996 1292 DesktopLayer.exe 31 PID 1292 wrote to memory of 2996 1292 DesktopLayer.exe 31 PID 2996 wrote to memory of 2628 2996 iexplore.exe 32 PID 2996 wrote to memory of 2628 2996 iexplore.exe 32 PID 2996 wrote to memory of 2628 2996 iexplore.exe 32 PID 2996 wrote to memory of 2628 2996 iexplore.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\380232c4d78e4c015ab8469ff62c8f2d4d44f2ebbc3aca0baf26d785402d87dc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\380232c4d78e4c015ab8469ff62c8f2d4d44f2ebbc3aca0baf26d785402d87dc.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf68a5706f7684ca8945286167db2b2c
SHA14f63c8aaebc961e21b57c8d34e9a6d6d7501e8bb
SHA256996ba84277ec38e2385f36834396385656fb516257fae39250f04db754e02a9c
SHA5121f7c69bfe4203f826700c13bc50a133b4280808b90ed987589db30f13724e269cfe984d633a4673c9269714d824f739ba84e50f608b809ea3ea122f253d04527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59ba5d84d385fdaba2000349b969cd5f1
SHA12680f8783e164459c3c8f825f1324bccd5d94cec
SHA2565fbffcdc175f5eccdecf72ba0550d3052c033b0f033cf3422708e85db3b471dc
SHA512d25c8af5b51de843da0661f660bc6ce7128dccd5553a67948a2f1983d4e31471e1a3e5e688f71e8c6b50376eb4642c3d56ad5d105237fb801f39c08686d8d38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD525da4296bcc6be73a6c747007b1151e2
SHA1c331b080dcebb1aff4b83f77a2810b1c64404fae
SHA2564b3d6b96949f6161a8c0c87728a5c430eac8599f94757abf498f13a0a95e241b
SHA512ee817b92a512e17d792e9e01c4312d6b38457b7997c2d6d89e6b098417f0c557d024364eed53c5141d0237305dbe0a8a39d5a2f29910f9a33b747b6a231f0f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5620c7f5fd09b2aa518b306a15cf45295
SHA14200ccfc56856afeff88a8c23a85825e747961e0
SHA2568707b000578a009764ef911c9148eac649f2771590487b9df86094d9633a8307
SHA51240d3ab6ca4014376c74b434b6a56621c5320b223f0e1fd2101735bd6f0e18c5816b38232195f4e5bf4abe4ff19cccd5655abae50598f669cb9d39e2392a17e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58673dcf80feabe3cc254aef99316028e
SHA17ed893b965b1f88f7b7f24e1824aa05eba573ad1
SHA256c6814c31032ef7a77c371a41a3ec7b8df4ec0484fd00df4bcf0e2bdc66e8a454
SHA5129829c46c20ce25dc54e78a2fc372664c8370fd62c5479e912c593a719af64fea18638bc8a69bd898831c2829ebbb8dbcf6b748476ac75a456a2cb8a1cdf91d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD503c6c4c2b53661752df9dceadf4afe1e
SHA16d683a2f0cc6f9d08e8572038d9d57cc3efe4357
SHA256818f8ff0b2b1666f6f0709da56d19e7ba51e7ba75b3c77e07efd4c0d2ec04e3c
SHA51234c20cf5b87540c42528d286b231314dfc6c5f07168391cd7567d1bb9f786aa4b47c085044402fae6c2f462d148bdaecedac9e643165d10b2d399f024ffd6eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe135e1077e97c2bd1bc6e91bbfd57e7
SHA190aa8f5bffc979c93d191db0af76059d9d0bc41d
SHA2563597c5ca43cc0e54f8e6c012399a1338c5381afb75789c0487a9827197a38381
SHA512f6b758b9c6780d96b70073ae3cb50d04066f715b1eaf326f7bfe299139c52e983023334cfe03c9f2e813f743c18b44e306a0c442aa5eda584057562997d261d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ef387116fc5c7d870cce8a590f73f31
SHA1b878ec360768899517383642115092d48db8fa25
SHA256ecf400316fb7713af11b5fa717b93c2355d282c6c2a61df85dfb28b3fd6a941e
SHA5121bb03c59e6f42c3047595ea1308c877bf8efdc94321e0e82eebb4dd5cd16070b4a20f03e29882c2d035e75e577a7ca52d1937ab0e36a76d8c2a1987eef9a215e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5462332975fc7e7f0dadb1d8aa17a4fa5
SHA10676818eb9c20ab18456c78211cfb12e2d8f5a8a
SHA256f98f6941ec666bd83214858994f45354b2ce0e43063fd2085fd43f0a0580db15
SHA512cf0a7b262d148af4f73a217d3b6999fdf1b8c8798300d10563ff63015addd4ac083d7240dc815a26ecf1174dedbc3aedcf9622c6248a5485d6ed94917603053c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56a6032dffa1b3c7c06cb6db953aadd60
SHA11c1925b921321b2ef0717d2fcc3c416b99fdb162
SHA256aa1717ad71436edb8ea57449276a700c2ceea8f9b9d435bb7dd83554928b279c
SHA512b78b392c2e2c7270ad3d5e6921c80f58afa26648983cc7ba6e7583f233ff0206aac841eb2707a2c8d269b5b47caa4b6a8aa1c91dda4e383699c1ac4b718018c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50578990549a4d4ad804728327a7e6592
SHA1cd787d746a0bd636a527a0d23767078a6a130607
SHA256cd723aa0972c8b10aab0c8d4b0082afb85b68acaae267e974da3de95f16b4fd8
SHA512653a9d09994a6db8a49e24ced414064b42101b914f9df86e9465bd032266e3fd33c7d2b0e978a109e040deed48ba9d7dcbab6859c640be22c47741cada4707e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e789208e77d734a4eff5dd6e6b46d0b
SHA1a44eb44aed148fd1673f595484f4ae4747b30a8b
SHA2563fe93154786625f8c91715a410e0c6a0e5e70c75cf1b309681b68663cb01ecda
SHA51210b64db2ce4527103c9ec833f7301e8a0c99bf8a51e4e6784d909c16d38365a874325980fdb05ef6a913bd3e8f0e9e5a87d7a60b7f67ce17f2476e28e43b13e6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD542bacbdf56184c2fa5fe6770857e2c2d
SHA1521a63ee9ce2f615eda692c382b16fc1b1d57cac
SHA256d1a57e19ddb9892e423248cc8ff0c4b1211d22e1ccad6111fcac218290f246f0
SHA5120ab916dd15278e51bccfd2ccedd80d942b0bddb9544cec3f73120780d4f7234ff7456530e1465caf3846616821d1b385b6ae58a5dff9ffe4d622902c24fd4b71