Analysis
-
max time kernel
113s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
26/04/2022, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
341d69cf4f5d9be493ebe9913f4150cf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
341d69cf4f5d9be493ebe9913f4150cf.exe
Resource
win10v2004-20220414-en
General
-
Target
341d69cf4f5d9be493ebe9913f4150cf.exe
-
Size
1.1MB
-
MD5
341d69cf4f5d9be493ebe9913f4150cf
-
SHA1
b043c610bf6b1fea68701910870d439501d8f832
-
SHA256
ea315e9e65af9d1d95ac0636abde389107bb131f99e9eeac2dd16821be1ba888
-
SHA512
50534e155760d2dde64e0737f90b63d35c1b0e3136007476d9e62b8eaf0bfb42225a57dc340c12e45a7346cdf56a857e403b4230d561b32991f1155f4d8294ab
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 14 4780 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4460 set thread context of 4980 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 4788 4460 WerFault.exe 80 1032 4460 WerFault.exe 80 760 4460 WerFault.exe 80 216 4460 WerFault.exe 80 -
Checks processor information in registry 2 TTPs 40 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 341d69cf4f5d9be493ebe9913f4150cf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 341d69cf4f5d9be493ebe9913f4150cf.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 341d69cf4f5d9be493ebe9913f4150cf.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 341d69cf4f5d9be493ebe9913f4150cf.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status 341d69cf4f5d9be493ebe9913f4150cf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 341d69cf4f5d9be493ebe9913f4150cf.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data 341d69cf4f5d9be493ebe9913f4150cf.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier 341d69cf4f5d9be493ebe9913f4150cf.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4980 rundll32.exe 4980 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4980 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4980 rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4780 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 82 PID 4460 wrote to memory of 4980 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 91 PID 4460 wrote to memory of 4980 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 91 PID 4460 wrote to memory of 4980 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 91 PID 4460 wrote to memory of 4980 4460 341d69cf4f5d9be493ebe9913f4150cf.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\341d69cf4f5d9be493ebe9913f4150cf.exe"C:\Users\Admin\AppData\Local\Temp\341d69cf4f5d9be493ebe9913f4150cf.exe"1⤵
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 6002⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 8682⤵
- Program crash
PID:1032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 9242⤵
- Program crash
PID:760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 10002⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- outlook_office_path
- outlook_win_path
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 4460 -ip 44601⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4460 -ip 44601⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4460 -ip 44601⤵PID:1340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4460 -ip 44601⤵PID:4792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5275f5752b1f0086ddaceb8abab43f86c
SHA119a4a3852df53c5cbd7351f441d6d626610ec253
SHA256f415df3c22123988e6a21a36b35471fbb4b0ab42682b95a2151995530f33c1f4
SHA512707dbb73610702b027528a84a1eee3485dcd6105485901a4144e9bf24d682f5eb32edc846db956bac5f4b5858ee044bd7b0c855203d3b2ce9b7afbbebfc46a7d