Analysis

  • max time kernel
    151s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 04:46

General

  • Target

    158fe2aef3c39a9e211907ed13e3056066679ad2b20906d9aebe7a1571ad4905.dll

  • Size

    350KB

  • MD5

    688b4924ea683be34c23bf81aeff18f3

  • SHA1

    55cd5d532a21e62b592a4f6c96676530b3d62c63

  • SHA256

    158fe2aef3c39a9e211907ed13e3056066679ad2b20906d9aebe7a1571ad4905

  • SHA512

    7275cdacc7b335cf083366c60f9d2cce419bc50cc553c642b4eca1154768905deaaa4affe28b70877fdd9cb25c6c4614dff0f18d62db997164b672fb6ceb2371

  • SSDEEP

    6144:u/bRffXkG7wilZUPBmopzdWQ4niWIGzVFPUnb:uNf/kGsWZwBDzdnMIGzHP

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\158fe2aef3c39a9e211907ed13e3056066679ad2b20906d9aebe7a1571ad4905.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\158fe2aef3c39a9e211907ed13e3056066679ad2b20906d9aebe7a1571ad4905.dll
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\SDxfmzdp
        "SDxfmzdp"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:936
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1472
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • UAC bypass
          • Checks BIOS information in registry
          • Drops startup file
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2044
        • C:\Users\Admin\AppData\Local\Temp\suuicfpurejpyvib.exe
          "C:\Users\Admin\AppData\Local\Temp\suuicfpurejpyvib.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SDxfmzdp

    Filesize

    96KB

    MD5

    254e4fa9c285f829b8134f470bbd08b9

    SHA1

    c6198611124c86c8d13204bd84c20fa41f8a9f20

    SHA256

    c271fd76007d951f28e3fa435d543530c4a6adaf1ad928841ffc99767da5ce57

    SHA512

    f5d1aa083731b410cc2dd9eacab10c065ee4ea7ecb56ce74dafc68439451254649b6d0db60626f7f6a9eae8ca65b94fd73d86eb75793fb647e6f7e0804b128e9

  • C:\Users\Admin\AppData\Local\Temp\SDxfmzdp

    Filesize

    96KB

    MD5

    254e4fa9c285f829b8134f470bbd08b9

    SHA1

    c6198611124c86c8d13204bd84c20fa41f8a9f20

    SHA256

    c271fd76007d951f28e3fa435d543530c4a6adaf1ad928841ffc99767da5ce57

    SHA512

    f5d1aa083731b410cc2dd9eacab10c065ee4ea7ecb56ce74dafc68439451254649b6d0db60626f7f6a9eae8ca65b94fd73d86eb75793fb647e6f7e0804b128e9

  • C:\Users\Admin\AppData\Local\Temp\suuicfpurejpyvib.exe

    Filesize

    96KB

    MD5

    254e4fa9c285f829b8134f470bbd08b9

    SHA1

    c6198611124c86c8d13204bd84c20fa41f8a9f20

    SHA256

    c271fd76007d951f28e3fa435d543530c4a6adaf1ad928841ffc99767da5ce57

    SHA512

    f5d1aa083731b410cc2dd9eacab10c065ee4ea7ecb56ce74dafc68439451254649b6d0db60626f7f6a9eae8ca65b94fd73d86eb75793fb647e6f7e0804b128e9

  • C:\Users\Admin\AppData\Local\Temp\suuicfpurejpyvib.exe

    Filesize

    96KB

    MD5

    254e4fa9c285f829b8134f470bbd08b9

    SHA1

    c6198611124c86c8d13204bd84c20fa41f8a9f20

    SHA256

    c271fd76007d951f28e3fa435d543530c4a6adaf1ad928841ffc99767da5ce57

    SHA512

    f5d1aa083731b410cc2dd9eacab10c065ee4ea7ecb56ce74dafc68439451254649b6d0db60626f7f6a9eae8ca65b94fd73d86eb75793fb647e6f7e0804b128e9

  • \Users\Admin\AppData\Local\Temp\SDxfmzdp

    Filesize

    96KB

    MD5

    254e4fa9c285f829b8134f470bbd08b9

    SHA1

    c6198611124c86c8d13204bd84c20fa41f8a9f20

    SHA256

    c271fd76007d951f28e3fa435d543530c4a6adaf1ad928841ffc99767da5ce57

    SHA512

    f5d1aa083731b410cc2dd9eacab10c065ee4ea7ecb56ce74dafc68439451254649b6d0db60626f7f6a9eae8ca65b94fd73d86eb75793fb647e6f7e0804b128e9

  • \Users\Admin\AppData\Local\Temp\SDxfmzdp

    Filesize

    96KB

    MD5

    254e4fa9c285f829b8134f470bbd08b9

    SHA1

    c6198611124c86c8d13204bd84c20fa41f8a9f20

    SHA256

    c271fd76007d951f28e3fa435d543530c4a6adaf1ad928841ffc99767da5ce57

    SHA512

    f5d1aa083731b410cc2dd9eacab10c065ee4ea7ecb56ce74dafc68439451254649b6d0db60626f7f6a9eae8ca65b94fd73d86eb75793fb647e6f7e0804b128e9

  • \Users\Admin\AppData\Local\Temp\suuicfpurejpyvib.exe

    Filesize

    96KB

    MD5

    254e4fa9c285f829b8134f470bbd08b9

    SHA1

    c6198611124c86c8d13204bd84c20fa41f8a9f20

    SHA256

    c271fd76007d951f28e3fa435d543530c4a6adaf1ad928841ffc99767da5ce57

    SHA512

    f5d1aa083731b410cc2dd9eacab10c065ee4ea7ecb56ce74dafc68439451254649b6d0db60626f7f6a9eae8ca65b94fd73d86eb75793fb647e6f7e0804b128e9

  • \Users\Admin\AppData\Local\Temp\suuicfpurejpyvib.exe

    Filesize

    96KB

    MD5

    254e4fa9c285f829b8134f470bbd08b9

    SHA1

    c6198611124c86c8d13204bd84c20fa41f8a9f20

    SHA256

    c271fd76007d951f28e3fa435d543530c4a6adaf1ad928841ffc99767da5ce57

    SHA512

    f5d1aa083731b410cc2dd9eacab10c065ee4ea7ecb56ce74dafc68439451254649b6d0db60626f7f6a9eae8ca65b94fd73d86eb75793fb647e6f7e0804b128e9

  • \Users\Admin\AppData\Local\Temp\suuicfpurejpyvib.exe

    Filesize

    96KB

    MD5

    254e4fa9c285f829b8134f470bbd08b9

    SHA1

    c6198611124c86c8d13204bd84c20fa41f8a9f20

    SHA256

    c271fd76007d951f28e3fa435d543530c4a6adaf1ad928841ffc99767da5ce57

    SHA512

    f5d1aa083731b410cc2dd9eacab10c065ee4ea7ecb56ce74dafc68439451254649b6d0db60626f7f6a9eae8ca65b94fd73d86eb75793fb647e6f7e0804b128e9

  • \Users\Admin\AppData\Local\Temp\suuicfpurejpyvib.exe

    Filesize

    96KB

    MD5

    254e4fa9c285f829b8134f470bbd08b9

    SHA1

    c6198611124c86c8d13204bd84c20fa41f8a9f20

    SHA256

    c271fd76007d951f28e3fa435d543530c4a6adaf1ad928841ffc99767da5ce57

    SHA512

    f5d1aa083731b410cc2dd9eacab10c065ee4ea7ecb56ce74dafc68439451254649b6d0db60626f7f6a9eae8ca65b94fd73d86eb75793fb647e6f7e0804b128e9

  • memory/936-81-0x0000000000400000-0x000000000043A21C-memory.dmp

    Filesize

    232KB

  • memory/968-91-0x0000000000400000-0x000000000043A21C-memory.dmp

    Filesize

    232KB

  • memory/968-90-0x0000000000400000-0x000000000043A21C-memory.dmp

    Filesize

    232KB

  • memory/1016-54-0x000007FEFC2C1000-0x000007FEFC2C3000-memory.dmp

    Filesize

    8KB

  • memory/1472-67-0x0000000020010000-0x000000002001C000-memory.dmp

    Filesize

    48KB

  • memory/1472-64-0x0000000020010000-0x000000002001C000-memory.dmp

    Filesize

    48KB

  • memory/2032-56-0x00000000756B1000-0x00000000756B3000-memory.dmp

    Filesize

    8KB

  • memory/2044-73-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2044-77-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB