Analysis

  • max time kernel
    153s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 03:44

General

  • Target

    a3af6a68a32a5734493ac2ada8968fce49aeae4b22c9bee505b9d9fcf732afa8.exe

  • Size

    1.0MB

  • MD5

    692a1d34cd7f7b145ef8d948c3cf42e6

  • SHA1

    cdec60fd3babf50a42c73ce6f29b6708d60b6976

  • SHA256

    a3af6a68a32a5734493ac2ada8968fce49aeae4b22c9bee505b9d9fcf732afa8

  • SHA512

    1fbe57b0b6658069d63f857665780cb2acb2020617d5812386ec8e82d94cf067a5feefee6d089ebc1add98294b64818bfcb1e4ae7f29f2b4903cc36f36af6b5b

  • SSDEEP

    24576:FVTnu29GSh7tuvhonSlaHvp4xAGwzJPYQmXgeohZsv:FVTnu3vhxqvvz5FmvoTsv

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 14 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3af6a68a32a5734493ac2ada8968fce49aeae4b22c9bee505b9d9fcf732afa8.exe
    "C:\Users\Admin\AppData\Local\Temp\a3af6a68a32a5734493ac2ada8968fce49aeae4b22c9bee505b9d9fcf732afa8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Roaming\MicrosoftT6bf519.exe
      "C:\Users\Admin\AppData\Roaming\MicrosoftT6bf519.exe" dmedmedme "C:\Users\Admin\AppData\Local\Temp\a3af6a68a32a5734493ac2ada8968fce49aeae4b22c9bee505b9d9fcf732afa8.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe shimgvw.dll,ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\a3af6a68a32a5734493ac2ada8968fce49aeae4b22c9bee505b9d9fcf732afa8.jpg
        3⤵
        • Suspicious use of FindShellTrayWindow
        PID:1744
      • C:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe
        3⤵
        • Executes dropped EXE
        • Sets DLL path for service in the registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:964
        • C:\Users\Admin\AppData\Local\Temp\RtlRightXUp.exe
          C:\Users\Admin\AppData\Local\Temp\RtlRightXUp.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          PID:904
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe c:\windows\system32\tianyu.dll, win7ol
      2⤵
      • Blocklisted process makes network request
      • Checks BIOS information in registry
      • Loads dropped DLL
      PID:1048

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Nod31.24399.tmp

          Filesize

          140B

          MD5

          7512249cfa40d8215a6646cc1010ced2

          SHA1

          bcdc1cd2ebe16cda15db66c330552a63c191fa26

          SHA256

          30c2126a0946e86136a354d9b0e56e41d58a46cff59037237751cc88dc215aac

          SHA512

          e09740111c7845e46b474490b690d6a7850a958390296f0a4400d4de6fa85b3445000ec4ffa3125d49f28430e165532b10ba935daf9dcdd7888599b5e04cf138

        • C:\Users\Admin\AppData\Local\Temp\RtlRightXUp.exe

          Filesize

          256KB

          MD5

          0c660dc079f914055fdf12432deb4bf5

          SHA1

          35ae7777e9825accbf48d31040f9e4e1b56ab35c

          SHA256

          ca7bd7c27db07b4b0fedd667bacd105594b42519fcfd7425711c1692362d2420

          SHA512

          8d74d7f63c75805b671dc19f45427a12eea9a6e3add2296741410e028e03866f9dfc893e89d4bc5b333ede24edcb36763f41bfe7a2405c7257818b460fe9c624

        • C:\Users\Admin\AppData\Local\Temp\RtlRightXUp.exe

          Filesize

          256KB

          MD5

          0c660dc079f914055fdf12432deb4bf5

          SHA1

          35ae7777e9825accbf48d31040f9e4e1b56ab35c

          SHA256

          ca7bd7c27db07b4b0fedd667bacd105594b42519fcfd7425711c1692362d2420

          SHA512

          8d74d7f63c75805b671dc19f45427a12eea9a6e3add2296741410e028e03866f9dfc893e89d4bc5b333ede24edcb36763f41bfe7a2405c7257818b460fe9c624

        • C:\Users\Admin\AppData\Local\Temp\a3af6a68a32a5734493ac2ada8968fce49aeae4b22c9bee505b9d9fcf732afa8.jpg

          Filesize

          77KB

          MD5

          5acfc65ec3d7e93fe9004d5a7ea6f5e1

          SHA1

          5c3de58f64c359abbf19ea050dafcc9a1e7eefaf

          SHA256

          6fa441e8bf3694e6c2716b89333eb1477989749a8601f5f2dbe1e342c9d61b34

          SHA512

          8dbd931ad5335b092f7faab3d0cfe059d2b93154482f96a35ca6f41f86032e9a4878458bcbed21cb4f37b685270e8440ad4295a82d36b6cf9772c67dcd173921

        • C:\Users\Admin\AppData\Roaming\MicrosoftT6bf519.exe

          Filesize

          1.0MB

          MD5

          692a1d34cd7f7b145ef8d948c3cf42e6

          SHA1

          cdec60fd3babf50a42c73ce6f29b6708d60b6976

          SHA256

          a3af6a68a32a5734493ac2ada8968fce49aeae4b22c9bee505b9d9fcf732afa8

          SHA512

          1fbe57b0b6658069d63f857665780cb2acb2020617d5812386ec8e82d94cf067a5feefee6d089ebc1add98294b64818bfcb1e4ae7f29f2b4903cc36f36af6b5b

        • C:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe

          Filesize

          916KB

          MD5

          eadbebecc63fb1f20cdd898314251fee

          SHA1

          5c10acc868c04a226154f249c17ac435310e776a

          SHA256

          389336ac5ed76cada25990bad86b13d60e03ba3fcc23fc79ad2620c15e85629c

          SHA512

          80caa0033348411de670f3f5dfe62c01056bb5951348bdfb76f1d0bf016060270570539031532c938ef64f6dd947db51792a26eb5fb3dd76a8cb5760aef51391

        • C:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe

          Filesize

          916KB

          MD5

          eadbebecc63fb1f20cdd898314251fee

          SHA1

          5c10acc868c04a226154f249c17ac435310e776a

          SHA256

          389336ac5ed76cada25990bad86b13d60e03ba3fcc23fc79ad2620c15e85629c

          SHA512

          80caa0033348411de670f3f5dfe62c01056bb5951348bdfb76f1d0bf016060270570539031532c938ef64f6dd947db51792a26eb5fb3dd76a8cb5760aef51391

        • \??\c:\windows\SysWOW64\tianyu.dll

          Filesize

          548KB

          MD5

          d993b607781102f2c7f3bc8ce0fc201b

          SHA1

          2913b00b19c66201f1ad6acca56c79f6349c46a6

          SHA256

          45ae33aac2cafae22a2ed9494b9ef54ce74985a96ffa09ddec73258333c729c5

          SHA512

          4b769ca361f0912d019b5943e5cdedf347938382dd39a6631f95e3b84eb9443fcc91ce2a086516ecf4317a3931ad59d821ca71f9f4d2e2457ecc79b3317a18bb

        • \Users\Admin\AppData\Local\Temp\RtlRightXUp.exe

          Filesize

          256KB

          MD5

          0c660dc079f914055fdf12432deb4bf5

          SHA1

          35ae7777e9825accbf48d31040f9e4e1b56ab35c

          SHA256

          ca7bd7c27db07b4b0fedd667bacd105594b42519fcfd7425711c1692362d2420

          SHA512

          8d74d7f63c75805b671dc19f45427a12eea9a6e3add2296741410e028e03866f9dfc893e89d4bc5b333ede24edcb36763f41bfe7a2405c7257818b460fe9c624

        • \Users\Admin\AppData\Local\Temp\RtlRightXUp.exe

          Filesize

          256KB

          MD5

          0c660dc079f914055fdf12432deb4bf5

          SHA1

          35ae7777e9825accbf48d31040f9e4e1b56ab35c

          SHA256

          ca7bd7c27db07b4b0fedd667bacd105594b42519fcfd7425711c1692362d2420

          SHA512

          8d74d7f63c75805b671dc19f45427a12eea9a6e3add2296741410e028e03866f9dfc893e89d4bc5b333ede24edcb36763f41bfe7a2405c7257818b460fe9c624

        • \Users\Admin\AppData\Local\Temp\RtlRightXUp.exe

          Filesize

          256KB

          MD5

          0c660dc079f914055fdf12432deb4bf5

          SHA1

          35ae7777e9825accbf48d31040f9e4e1b56ab35c

          SHA256

          ca7bd7c27db07b4b0fedd667bacd105594b42519fcfd7425711c1692362d2420

          SHA512

          8d74d7f63c75805b671dc19f45427a12eea9a6e3add2296741410e028e03866f9dfc893e89d4bc5b333ede24edcb36763f41bfe7a2405c7257818b460fe9c624

        • \Users\Admin\AppData\Roaming\MicrosoftT6bf519.exe

          Filesize

          1.0MB

          MD5

          692a1d34cd7f7b145ef8d948c3cf42e6

          SHA1

          cdec60fd3babf50a42c73ce6f29b6708d60b6976

          SHA256

          a3af6a68a32a5734493ac2ada8968fce49aeae4b22c9bee505b9d9fcf732afa8

          SHA512

          1fbe57b0b6658069d63f857665780cb2acb2020617d5812386ec8e82d94cf067a5feefee6d089ebc1add98294b64818bfcb1e4ae7f29f2b4903cc36f36af6b5b

        • \Users\Admin\AppData\Roaming\MicrosoftT6bf519.exe

          Filesize

          1.0MB

          MD5

          692a1d34cd7f7b145ef8d948c3cf42e6

          SHA1

          cdec60fd3babf50a42c73ce6f29b6708d60b6976

          SHA256

          a3af6a68a32a5734493ac2ada8968fce49aeae4b22c9bee505b9d9fcf732afa8

          SHA512

          1fbe57b0b6658069d63f857665780cb2acb2020617d5812386ec8e82d94cf067a5feefee6d089ebc1add98294b64818bfcb1e4ae7f29f2b4903cc36f36af6b5b

        • \Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe

          Filesize

          916KB

          MD5

          eadbebecc63fb1f20cdd898314251fee

          SHA1

          5c10acc868c04a226154f249c17ac435310e776a

          SHA256

          389336ac5ed76cada25990bad86b13d60e03ba3fcc23fc79ad2620c15e85629c

          SHA512

          80caa0033348411de670f3f5dfe62c01056bb5951348bdfb76f1d0bf016060270570539031532c938ef64f6dd947db51792a26eb5fb3dd76a8cb5760aef51391

        • \Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe

          Filesize

          916KB

          MD5

          eadbebecc63fb1f20cdd898314251fee

          SHA1

          5c10acc868c04a226154f249c17ac435310e776a

          SHA256

          389336ac5ed76cada25990bad86b13d60e03ba3fcc23fc79ad2620c15e85629c

          SHA512

          80caa0033348411de670f3f5dfe62c01056bb5951348bdfb76f1d0bf016060270570539031532c938ef64f6dd947db51792a26eb5fb3dd76a8cb5760aef51391

        • \Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe

          Filesize

          916KB

          MD5

          eadbebecc63fb1f20cdd898314251fee

          SHA1

          5c10acc868c04a226154f249c17ac435310e776a

          SHA256

          389336ac5ed76cada25990bad86b13d60e03ba3fcc23fc79ad2620c15e85629c

          SHA512

          80caa0033348411de670f3f5dfe62c01056bb5951348bdfb76f1d0bf016060270570539031532c938ef64f6dd947db51792a26eb5fb3dd76a8cb5760aef51391

        • \Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe

          Filesize

          916KB

          MD5

          eadbebecc63fb1f20cdd898314251fee

          SHA1

          5c10acc868c04a226154f249c17ac435310e776a

          SHA256

          389336ac5ed76cada25990bad86b13d60e03ba3fcc23fc79ad2620c15e85629c

          SHA512

          80caa0033348411de670f3f5dfe62c01056bb5951348bdfb76f1d0bf016060270570539031532c938ef64f6dd947db51792a26eb5fb3dd76a8cb5760aef51391

        • \Windows\SysWOW64\tianyu.dll

          Filesize

          548KB

          MD5

          d993b607781102f2c7f3bc8ce0fc201b

          SHA1

          2913b00b19c66201f1ad6acca56c79f6349c46a6

          SHA256

          45ae33aac2cafae22a2ed9494b9ef54ce74985a96ffa09ddec73258333c729c5

          SHA512

          4b769ca361f0912d019b5943e5cdedf347938382dd39a6631f95e3b84eb9443fcc91ce2a086516ecf4317a3931ad59d821ca71f9f4d2e2457ecc79b3317a18bb

        • \Windows\SysWOW64\tianyu.dll

          Filesize

          548KB

          MD5

          d993b607781102f2c7f3bc8ce0fc201b

          SHA1

          2913b00b19c66201f1ad6acca56c79f6349c46a6

          SHA256

          45ae33aac2cafae22a2ed9494b9ef54ce74985a96ffa09ddec73258333c729c5

          SHA512

          4b769ca361f0912d019b5943e5cdedf347938382dd39a6631f95e3b84eb9443fcc91ce2a086516ecf4317a3931ad59d821ca71f9f4d2e2457ecc79b3317a18bb

        • \Windows\SysWOW64\tianyu.dll

          Filesize

          548KB

          MD5

          d993b607781102f2c7f3bc8ce0fc201b

          SHA1

          2913b00b19c66201f1ad6acca56c79f6349c46a6

          SHA256

          45ae33aac2cafae22a2ed9494b9ef54ce74985a96ffa09ddec73258333c729c5

          SHA512

          4b769ca361f0912d019b5943e5cdedf347938382dd39a6631f95e3b84eb9443fcc91ce2a086516ecf4317a3931ad59d821ca71f9f4d2e2457ecc79b3317a18bb

        • \Windows\SysWOW64\tianyu.dll

          Filesize

          548KB

          MD5

          d993b607781102f2c7f3bc8ce0fc201b

          SHA1

          2913b00b19c66201f1ad6acca56c79f6349c46a6

          SHA256

          45ae33aac2cafae22a2ed9494b9ef54ce74985a96ffa09ddec73258333c729c5

          SHA512

          4b769ca361f0912d019b5943e5cdedf347938382dd39a6631f95e3b84eb9443fcc91ce2a086516ecf4317a3931ad59d821ca71f9f4d2e2457ecc79b3317a18bb

        • \Windows\SysWOW64\tianyu.dll

          Filesize

          548KB

          MD5

          d993b607781102f2c7f3bc8ce0fc201b

          SHA1

          2913b00b19c66201f1ad6acca56c79f6349c46a6

          SHA256

          45ae33aac2cafae22a2ed9494b9ef54ce74985a96ffa09ddec73258333c729c5

          SHA512

          4b769ca361f0912d019b5943e5cdedf347938382dd39a6631f95e3b84eb9443fcc91ce2a086516ecf4317a3931ad59d821ca71f9f4d2e2457ecc79b3317a18bb

        • memory/964-77-0x0000000000320000-0x0000000000374000-memory.dmp

          Filesize

          336KB

        • memory/964-75-0x0000000000400000-0x0000000000566000-memory.dmp

          Filesize

          1.4MB

        • memory/964-88-0x0000000000400000-0x0000000000566000-memory.dmp

          Filesize

          1.4MB

        • memory/964-89-0x0000000000320000-0x0000000000374000-memory.dmp

          Filesize

          336KB

        • memory/964-76-0x0000000000AE0000-0x0000000000C46000-memory.dmp

          Filesize

          1.4MB

        • memory/964-78-0x00000000033A0000-0x00000000033A5000-memory.dmp

          Filesize

          20KB

        • memory/1048-102-0x0000000010000000-0x000000001009C000-memory.dmp

          Filesize

          624KB

        • memory/1048-101-0x0000000010000000-0x000000001009C000-memory.dmp

          Filesize

          624KB

        • memory/1048-107-0x0000000010000000-0x000000001009C000-memory.dmp

          Filesize

          624KB

        • memory/1048-106-0x0000000010000000-0x000000001009C000-memory.dmp

          Filesize

          624KB

        • memory/1048-104-0x0000000010000000-0x000000001009C000-memory.dmp

          Filesize

          624KB

        • memory/1400-91-0x0000000010000000-0x000000001009C000-memory.dmp

          Filesize

          624KB

        • memory/1400-105-0x0000000010000000-0x000000001009C000-memory.dmp

          Filesize

          624KB

        • memory/1400-92-0x0000000010000000-0x000000001009C000-memory.dmp

          Filesize

          624KB

        • memory/1400-94-0x0000000010000000-0x000000001009C000-memory.dmp

          Filesize

          624KB

        • memory/1640-54-0x0000000075811000-0x0000000075813000-memory.dmp

          Filesize

          8KB

        • memory/2004-65-0x0000000002310000-0x00000000023F6000-memory.dmp

          Filesize

          920KB