Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 03:18

General

  • Target

    77c5f3b7ddc1dbc9df1e341d849a6314a92b37f4ca2fdfb5e04772d1d6792ed1.dll

  • Size

    268KB

  • MD5

    420fbd7ded2ec28ad4130631c272f720

  • SHA1

    be67e2aaaa1cdb74210384619c36662025923b45

  • SHA256

    77c5f3b7ddc1dbc9df1e341d849a6314a92b37f4ca2fdfb5e04772d1d6792ed1

  • SHA512

    0794ebe0fe5a5287afcb0af2edc1432e4639f626f7168a8b4fc12f6f76b0544d8bab0fe8eff901bb4207525603fe57b5352b46b984e8cc661c89792817f22bca

  • SSDEEP

    6144:UW7QnuDi+G+mEAOttoeCjOCjl86rH916tD:UrnuDZmENoDPj6qd1

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\77c5f3b7ddc1dbc9df1e341d849a6314a92b37f4ca2fdfb5e04772d1d6792ed1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1340
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\77c5f3b7ddc1dbc9df1e341d849a6314a92b37f4ca2fdfb5e04772d1d6792ed1.dll,#1
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\35j8xBw
        "35j8xBw"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:844
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:268
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • UAC bypass
          • Checks BIOS information in registry
          • Drops startup file
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:572
        • C:\Users\Admin\AppData\Local\Temp\dqxrxkiamkmktydv.exe
          "C:\Users\Admin\AppData\Local\Temp\dqxrxkiamkmktydv.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1576
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 236
        3⤵
        • Program crash
        PID:1464

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\35j8xBw

          Filesize

          95KB

          MD5

          7fc51f7f09344a3dbeb28e14c35ce39d

          SHA1

          c8a9082351f5edcd3012d5379caa33e0804e954f

          SHA256

          91eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78

          SHA512

          b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508

        • C:\Users\Admin\AppData\Local\Temp\35j8xBw

          Filesize

          95KB

          MD5

          7fc51f7f09344a3dbeb28e14c35ce39d

          SHA1

          c8a9082351f5edcd3012d5379caa33e0804e954f

          SHA256

          91eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78

          SHA512

          b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508

        • C:\Users\Admin\AppData\Local\Temp\dqxrxkiamkmktydv.exe

          Filesize

          95KB

          MD5

          7fc51f7f09344a3dbeb28e14c35ce39d

          SHA1

          c8a9082351f5edcd3012d5379caa33e0804e954f

          SHA256

          91eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78

          SHA512

          b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508

        • C:\Users\Admin\AppData\Local\Temp\dqxrxkiamkmktydv.exe

          Filesize

          95KB

          MD5

          7fc51f7f09344a3dbeb28e14c35ce39d

          SHA1

          c8a9082351f5edcd3012d5379caa33e0804e954f

          SHA256

          91eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78

          SHA512

          b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508

        • \Users\Admin\AppData\Local\Temp\35j8xBw

          Filesize

          95KB

          MD5

          7fc51f7f09344a3dbeb28e14c35ce39d

          SHA1

          c8a9082351f5edcd3012d5379caa33e0804e954f

          SHA256

          91eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78

          SHA512

          b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508

        • \Users\Admin\AppData\Local\Temp\35j8xBw

          Filesize

          95KB

          MD5

          7fc51f7f09344a3dbeb28e14c35ce39d

          SHA1

          c8a9082351f5edcd3012d5379caa33e0804e954f

          SHA256

          91eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78

          SHA512

          b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508

        • \Users\Admin\AppData\Local\Temp\dqxrxkiamkmktydv.exe

          Filesize

          95KB

          MD5

          7fc51f7f09344a3dbeb28e14c35ce39d

          SHA1

          c8a9082351f5edcd3012d5379caa33e0804e954f

          SHA256

          91eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78

          SHA512

          b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508

        • \Users\Admin\AppData\Local\Temp\dqxrxkiamkmktydv.exe

          Filesize

          95KB

          MD5

          7fc51f7f09344a3dbeb28e14c35ce39d

          SHA1

          c8a9082351f5edcd3012d5379caa33e0804e954f

          SHA256

          91eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78

          SHA512

          b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508

        • \Users\Admin\AppData\Local\Temp\dqxrxkiamkmktydv.exe

          Filesize

          95KB

          MD5

          7fc51f7f09344a3dbeb28e14c35ce39d

          SHA1

          c8a9082351f5edcd3012d5379caa33e0804e954f

          SHA256

          91eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78

          SHA512

          b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508

        • \Users\Admin\AppData\Local\Temp\dqxrxkiamkmktydv.exe

          Filesize

          95KB

          MD5

          7fc51f7f09344a3dbeb28e14c35ce39d

          SHA1

          c8a9082351f5edcd3012d5379caa33e0804e954f

          SHA256

          91eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78

          SHA512

          b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508

        • memory/268-63-0x0000000020010000-0x000000002001C000-memory.dmp

          Filesize

          48KB

        • memory/268-67-0x0000000020010000-0x000000002001C000-memory.dmp

          Filesize

          48KB

        • memory/572-77-0x0000000020010000-0x000000002002C000-memory.dmp

          Filesize

          112KB

        • memory/572-73-0x0000000020010000-0x000000002002C000-memory.dmp

          Filesize

          112KB

        • memory/844-83-0x0000000000400000-0x000000000043A04C-memory.dmp

          Filesize

          232KB

        • memory/1228-81-0x0000000010000000-0x0000000010045000-memory.dmp

          Filesize

          276KB

        • memory/1228-82-0x00000000006F0000-0x000000000072B000-memory.dmp

          Filesize

          236KB

        • memory/1228-55-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

          Filesize

          8KB

        • memory/1576-92-0x0000000000400000-0x000000000043A04C-memory.dmp

          Filesize

          232KB

        • memory/1576-93-0x0000000000400000-0x000000000043A04C-memory.dmp

          Filesize

          232KB