Analysis
-
max time kernel
119s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
be4f04a6cb1df55610f461e3e05d81daebe75cbab021746e0cbf6b05389ff02b.dll
Resource
win7-20240705-en
General
-
Target
be4f04a6cb1df55610f461e3e05d81daebe75cbab021746e0cbf6b05389ff02b.dll
-
Size
92KB
-
MD5
6ab9c7292fe2829ca577e54bef18619b
-
SHA1
2a6c3403c3fac73da0c848a06818daae3c722182
-
SHA256
be4f04a6cb1df55610f461e3e05d81daebe75cbab021746e0cbf6b05389ff02b
-
SHA512
6f830c9b8984f4dfc4f46c2a3ea06da1d0205f1f3a9467d5091153807f6b0874d5bf03d2039fc5778d3819465e02771ba6e3b9cd31ced9e777eaaf0d82e5259c
-
SSDEEP
1536:ymg4T4vONoRohd42hcGliEbPgQpZiX+XBFTmtXHVR0xDhjt:yjL8oRQNrPK+PTmV1R8h
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2552 rundll32Srv.exe 2660 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2756 rundll32.exe 2552 rundll32Srv.exe -
resource yara_rule behavioral1/files/0x0005000000010300-1.dat upx behavioral1/memory/2660-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2552-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2552-8-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px20AA.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2564 2756 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EE90691-4B11-11EF-BDB6-FE3EAF6E2A14} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428134125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2660 DesktopLayer.exe 2660 DesktopLayer.exe 2660 DesktopLayer.exe 2660 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2756 2888 rundll32.exe 30 PID 2888 wrote to memory of 2756 2888 rundll32.exe 30 PID 2888 wrote to memory of 2756 2888 rundll32.exe 30 PID 2888 wrote to memory of 2756 2888 rundll32.exe 30 PID 2888 wrote to memory of 2756 2888 rundll32.exe 30 PID 2888 wrote to memory of 2756 2888 rundll32.exe 30 PID 2888 wrote to memory of 2756 2888 rundll32.exe 30 PID 2756 wrote to memory of 2552 2756 rundll32.exe 31 PID 2756 wrote to memory of 2552 2756 rundll32.exe 31 PID 2756 wrote to memory of 2552 2756 rundll32.exe 31 PID 2756 wrote to memory of 2552 2756 rundll32.exe 31 PID 2756 wrote to memory of 2564 2756 rundll32.exe 32 PID 2756 wrote to memory of 2564 2756 rundll32.exe 32 PID 2756 wrote to memory of 2564 2756 rundll32.exe 32 PID 2756 wrote to memory of 2564 2756 rundll32.exe 32 PID 2552 wrote to memory of 2660 2552 rundll32Srv.exe 33 PID 2552 wrote to memory of 2660 2552 rundll32Srv.exe 33 PID 2552 wrote to memory of 2660 2552 rundll32Srv.exe 33 PID 2552 wrote to memory of 2660 2552 rundll32Srv.exe 33 PID 2660 wrote to memory of 2912 2660 DesktopLayer.exe 34 PID 2660 wrote to memory of 2912 2660 DesktopLayer.exe 34 PID 2660 wrote to memory of 2912 2660 DesktopLayer.exe 34 PID 2660 wrote to memory of 2912 2660 DesktopLayer.exe 34 PID 2912 wrote to memory of 2496 2912 iexplore.exe 35 PID 2912 wrote to memory of 2496 2912 iexplore.exe 35 PID 2912 wrote to memory of 2496 2912 iexplore.exe 35 PID 2912 wrote to memory of 2496 2912 iexplore.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be4f04a6cb1df55610f461e3e05d81daebe75cbab021746e0cbf6b05389ff02b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be4f04a6cb1df55610f461e3e05d81daebe75cbab021746e0cbf6b05389ff02b.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 2243⤵
- Program crash
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ec7ae9983012efe2c7d9ab27dbc742
SHA1a9b200a6e98985bea225dd3e0a3a6ba6616c757f
SHA25606b399799c195b5f76e9ff88d2991a2a48d135db4b542b0cca2d1d6624210893
SHA5124756861a9f99ca5a45db53ac681806c7ac9b97bd7d738a7b93a5f0769ff55ed9a6fcbf0701439e4ca6c6866b8f6d1bb2ebb8e8b9c940af7a23b25674b9458064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f6de216dae332e773fb21cd8d05406b
SHA10f4c018a0355094c10180e87b6dccb7d20db55f6
SHA256f65ff702d1cf42785ec6e299c11f319c3628ab5073f691eaa1dc2fc3769c879f
SHA5120030feba9de705a700aa0d3a343ec10eaca863c3e5a6f886dcbe6cff88014580c9b89e54318120e89fd4abcd0b9c86a2aba1c2ff6bc3206eef1dabc8925e0e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9192f5fdfbb43969cf7e56b9f3d7db4
SHA1d97684b465e535ef55992bd9f53cefa54aa576a7
SHA256dd5656dcf4bb768e2c70291975d821683bef4f969da3db6b7095e70930a0642b
SHA5125abc613a1699e445799015886630a4711fc957feb6f11dd0fda43e640673b7d22152038a14b9c7630aa948cf96e3264f2aea13df73bfe9f2a8d441d2b5d69a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9e54bea46bcf0c8894f19d1bd05342
SHA1a8948d2c5fbcc58940b21fbb43e483b030455f30
SHA256ff6520ae35854757fb0c2165132ee95dd6070ecb9c7f88f32f7b5b423937b252
SHA512ff5a08a9f72defccd5d0545ef480c69e00d5d733fb1cf944822bc5750f039ffe8e65c3cd37b6703c05505e192978cdf9bcfb70ece12206bd453280063ce5281a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fccac145efcdefd20a3b77e0c3242494
SHA1016c60cb900307d3633c7438460f36b8a907b89c
SHA256671a13fa72c82d23074779fb86c682a9803c81e4b70736d454f7c7720d2fb9bc
SHA5121232084f9782b6a5f9227810d7d455fcfa0d1288e6c4e46ed6598319c1a357aca7235a449b5c2105f38e141b9e2eb23690a5ce098507a51b1933c5948e78713a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565218554723ca93cf0f889b772153d4e
SHA1643a539ad5f1bddb0a2648809dea0a5d9ba8acad
SHA2563e5d0b51717a67665a6608520b172cfd516933271424b359240e30431653b9cd
SHA5124d413d05b816ddb182fda91579fc26da346e990da4a25993a38c3baf18d2ee73d7f8dc6c06c150278d4c9e8a06309299c2f6e6609619103a8e52e13f715580e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef11771e1faa5eb2e8124cc4cd4548b4
SHA11e79288bb4dc1d832d45571ec1fc8e64934410ce
SHA2563f4a99c8252723a412d64c3f353d00d5553fe997172ab6f6babade87ecacafc2
SHA51203ec0b83e5bae99d5f54f5706a70ef05a2baf8c5ed998d471a9e57ef68659d1cf88fa490df601e195a7f962c8737e0a783283544fdde8666decd7f4cbe998098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a70e8cc5c5263f4710b0bd610f75fb
SHA1c7899dd0015794da20bd6cc4a79b0c31fe2a09e5
SHA256a510957db2459314103be5362c6a0aa57286cce419f7d0c499e2d6fd616c5f29
SHA512d47824bd400dcfe14187b06d75bba83a5e0f32e1ea61fde63ae7b418bc3afaa1503382b759f7dfc74a7d70bdfc42c83e7803b1ae59298d14c17e79254ec9a32a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a