Analysis

  • max time kernel
    145s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:50

General

  • Target

    68e13d12273780f9fff621947ebcec70.exe

  • Size

    1.0MB

  • MD5

    68e13d12273780f9fff621947ebcec70

  • SHA1

    2138ad56054273073df614dba3800e3a92292c31

  • SHA256

    ae75ea24367ee8472c936fd70cbc4428fb83ec546f2cc17def3c95cbf6abd67e

  • SHA512

    4a2df5bbbafabb1ae120d4e9ea1a1b90473c42812f5059df63b7b4eaab48408b0bbe712a79ea79c43fc9ee5fe09da89be1f23fc85f296569f4a6d03c5cdf21d7

  • SSDEEP

    24576:YuDLYe9wBCwOoSknrA6xNJ7IRjNw77KtENfla27N5KN:YgLlwYwOoJA3w7xvPKN

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68e13d12273780f9fff621947ebcec70.exe
    "C:\Users\Admin\AppData\Local\Temp\68e13d12273780f9fff621947ebcec70.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp",Rrptfe
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14208
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1932
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k LocalService
    1⤵
      PID:580
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\microsoft synchronization services\ado.net\defaultid.dll",Xic3dlI=
        2⤵
          PID:108

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\{089124D9-86A1-7079-846D-B6413FD76F79}\MSS.chk
        Filesize

        8KB

        MD5

        f0ed87f0805ae905d1fc0ac1966eeeac

        SHA1

        1db3a1e1970af62c55670998dfbc9a8bc303a67b

        SHA256

        8d801b6fff21ca19b8a5688d5c77a45bb1b7fc57a90af186141c7d3452f00d5d

        SHA512

        addd4aff38d4226077400afb6645907ffb53e96c3ef432fe970fb956fa63b6c9db024385656454ca9202a81e2669ef347df43707fe63c5ec901d7de703023ab5

      • C:\ProgramData\{089124D9-86A1-7079-846D-B6413FD76F79}\PUB6INTL.REST.trx_dll
        Filesize

        568KB

        MD5

        30af748c7751fca8078e5c05bf36467b

        SHA1

        db9eacbd6438b07446d3a6c1206e813b8222a10e

        SHA256

        c1ff437693e66a412fa3452ca4038bc32d406153dac55dac7c28c62543640081

        SHA512

        acc75a6bb148ef7b9e9f90ecb53f13c983507c755b76405b6a4cfdb5758171e41484d7360e22d9e38968d5fb80bf4377b7b0cde7068e3fc5f7d0f6c9f50d3c34

      • C:\ProgramData\{089124D9-86A1-7079-846D-B6413FD76F79}\Speech Recognition.lnk
        Filesize

        1KB

        MD5

        1c2d57f6d10fc5fbc894a70c3c3e3cb3

        SHA1

        758c3a4828c321ae9c008e66067811baddb91b3c

        SHA256

        df9bdfa348c754781446438c5c46b3c2864a788e4ad735e9eaded00bd8c96de7

        SHA512

        f77720c2071a84f45aaa371912f8e5132d24de8d709efbb7c6a75c4faad463125c96cef988768277d92650b2e9216e53340a4e45fff4ab41426697d7ce5daf6f

      • C:\ProgramData\{089124D9-86A1-7079-846D-B6413FD76F79}\Tuririiowh.tmp
        Filesize

        3.5MB

        MD5

        a808110481ab8429977b76162e0051ed

        SHA1

        72cd74b4e62aabf82a065ba039223ccf74c7c43b

        SHA256

        dae85e50faeed4226fd3e060917a73fd62f7054d5336f815458f0c68fd3af712

        SHA512

        6c4cdac7646259cfc0758028db5fe0391689ee62720fd84a16d262ccd5e2d3a752520ce991d63eb573c60ff5d7fd3040c52b1d62b6d56cac2a38d3b2b58becd0

      • C:\ProgramData\{089124D9-86A1-7079-846D-B6413FD76F79}\Tuririiowh.tmp
        Filesize

        3.5MB

        MD5

        8b065256fa20c548b3fa1df963ae1a47

        SHA1

        b895fe7437a7f0cf592c8c06790355f4e18fe30a

        SHA256

        b6cb79aaba1c217a4cc3ec873765dcb5d9ac7a73f95a2fe88373959220685d34

        SHA512

        f87b02922adcee27b2d644254329e0d3151b18229a7f0fd9766be06d31c598ac3090128711578aecc5d98b435789ef8359b3773cb77f6a6515af696346dd52e9

      • C:\ProgramData\{089124D9-86A1-7079-846D-B6413FD76F79}\scan_settings.ico
        Filesize

        62KB

        MD5

        8f6abfe0c274c41c3ad3c1becf2317f5

        SHA1

        6dc69b46e569ca11e3ec081293df69a6d115674c

        SHA256

        d660f44fb7efbfdcec4cba821fea1be0977e3f66cc709b313edf9ead575994a5

        SHA512

        ed474a6d52df65b5bf7a1bd81d54458a1258571f16b28ce043189815bf6dc57c49cb31c6f48fed9791de6b69f93331282a0c6e76e54d488ddad7e30d2333a1b2

      • C:\ProgramData\{089124D9-86A1-7079-846D-B6413FD76F79}\usertile26.bmp
        Filesize

        48KB

        MD5

        3d404187efd7b9fb9810d112bd8cc368

        SHA1

        4c18184896e46369b2af6de3d84c25f44d3f051e

        SHA256

        410fd53c9634965c2b56efbf7a774d79014c98a2cd1d767adc51636e97428c5d

        SHA512

        5c1ab1a5309e0d2ea3f08e0e01d1291cf964de682c06812061d46d7bf8db454d36532c58fa511873564db9cfa9d215a63e752d57acb5038581b3b9a55dd27390

      • C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp
        Filesize

        774KB

        MD5

        d5e88f35e214f2dff51a7d494316bac2

        SHA1

        6306dfa71c4e32dede210631cf90732693c0afcf

        SHA256

        f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4

        SHA512

        ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d

      • \??\c:\program files (x86)\microsoft synchronization services\ado.net\defaultid.dll
        Filesize

        774KB

        MD5

        ca06dff09b2cb04e65d032c174ecbf92

        SHA1

        1916efaa77a5c7de9120c37ff542918e6685c3be

        SHA256

        cf69563c430e5fa080bd09970f71d8ca77e6620c4e7dc8830f9d1fe28ad0fbf9

        SHA512

        1985b56c0ae90cec1d51b983b4942174fd064d0e41d425ad8f8dc2014348c48017d96890ba63d6a096f3200988a4e2fff937acbdb3940b8d915af03d1b80ec9a

      • \Program Files (x86)\Microsoft Synchronization Services\ADO.NET\DefaultID.dll
        Filesize

        774KB

        MD5

        ca06dff09b2cb04e65d032c174ecbf92

        SHA1

        1916efaa77a5c7de9120c37ff542918e6685c3be

        SHA256

        cf69563c430e5fa080bd09970f71d8ca77e6620c4e7dc8830f9d1fe28ad0fbf9

        SHA512

        1985b56c0ae90cec1d51b983b4942174fd064d0e41d425ad8f8dc2014348c48017d96890ba63d6a096f3200988a4e2fff937acbdb3940b8d915af03d1b80ec9a

      • \Program Files (x86)\Microsoft Synchronization Services\ADO.NET\DefaultID.dll
        Filesize

        774KB

        MD5

        ca06dff09b2cb04e65d032c174ecbf92

        SHA1

        1916efaa77a5c7de9120c37ff542918e6685c3be

        SHA256

        cf69563c430e5fa080bd09970f71d8ca77e6620c4e7dc8830f9d1fe28ad0fbf9

        SHA512

        1985b56c0ae90cec1d51b983b4942174fd064d0e41d425ad8f8dc2014348c48017d96890ba63d6a096f3200988a4e2fff937acbdb3940b8d915af03d1b80ec9a

      • \Program Files (x86)\Microsoft Synchronization Services\ADO.NET\DefaultID.dll
        Filesize

        774KB

        MD5

        ca06dff09b2cb04e65d032c174ecbf92

        SHA1

        1916efaa77a5c7de9120c37ff542918e6685c3be

        SHA256

        cf69563c430e5fa080bd09970f71d8ca77e6620c4e7dc8830f9d1fe28ad0fbf9

        SHA512

        1985b56c0ae90cec1d51b983b4942174fd064d0e41d425ad8f8dc2014348c48017d96890ba63d6a096f3200988a4e2fff937acbdb3940b8d915af03d1b80ec9a

      • \Program Files (x86)\Microsoft Synchronization Services\ADO.NET\DefaultID.dll
        Filesize

        774KB

        MD5

        ca06dff09b2cb04e65d032c174ecbf92

        SHA1

        1916efaa77a5c7de9120c37ff542918e6685c3be

        SHA256

        cf69563c430e5fa080bd09970f71d8ca77e6620c4e7dc8830f9d1fe28ad0fbf9

        SHA512

        1985b56c0ae90cec1d51b983b4942174fd064d0e41d425ad8f8dc2014348c48017d96890ba63d6a096f3200988a4e2fff937acbdb3940b8d915af03d1b80ec9a

      • \Program Files (x86)\Microsoft Synchronization Services\ADO.NET\DefaultID.dll
        Filesize

        774KB

        MD5

        ca06dff09b2cb04e65d032c174ecbf92

        SHA1

        1916efaa77a5c7de9120c37ff542918e6685c3be

        SHA256

        cf69563c430e5fa080bd09970f71d8ca77e6620c4e7dc8830f9d1fe28ad0fbf9

        SHA512

        1985b56c0ae90cec1d51b983b4942174fd064d0e41d425ad8f8dc2014348c48017d96890ba63d6a096f3200988a4e2fff937acbdb3940b8d915af03d1b80ec9a

      • \Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp
        Filesize

        774KB

        MD5

        d5e88f35e214f2dff51a7d494316bac2

        SHA1

        6306dfa71c4e32dede210631cf90732693c0afcf

        SHA256

        f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4

        SHA512

        ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d

      • memory/108-103-0x00000000040D0000-0x0000000004C31000-memory.dmp
        Filesize

        11.4MB

      • memory/108-96-0x0000000000000000-mapping.dmp
      • memory/108-105-0x00000000040D0000-0x0000000004C31000-memory.dmp
        Filesize

        11.4MB

      • memory/108-106-0x00000000040D0000-0x0000000004C31000-memory.dmp
        Filesize

        11.4MB

      • memory/580-89-0x0000000004170000-0x0000000004CD1000-memory.dmp
        Filesize

        11.4MB

      • memory/580-95-0x0000000004170000-0x0000000004CD1000-memory.dmp
        Filesize

        11.4MB

      • memory/580-87-0x0000000004170000-0x0000000004CD1000-memory.dmp
        Filesize

        11.4MB

      • memory/1032-60-0x0000000000400000-0x000000000071E000-memory.dmp
        Filesize

        3.1MB

      • memory/1032-54-0x0000000000720000-0x0000000000801000-memory.dmp
        Filesize

        900KB

      • memory/1032-57-0x0000000000720000-0x0000000000801000-memory.dmp
        Filesize

        900KB

      • memory/1032-59-0x0000000002160000-0x0000000002285000-memory.dmp
        Filesize

        1.1MB

      • memory/1032-63-0x0000000000400000-0x000000000071E000-memory.dmp
        Filesize

        3.1MB

      • memory/1032-55-0x0000000075501000-0x0000000075503000-memory.dmp
        Filesize

        8KB

      • memory/1932-78-0x0000000002300000-0x0000000002440000-memory.dmp
        Filesize

        1.2MB

      • memory/1932-76-0x00000000FF743CEC-mapping.dmp
      • memory/1932-81-0x0000000002050000-0x00000000022F4000-memory.dmp
        Filesize

        2.6MB

      • memory/1932-80-0x0000000000140000-0x00000000003D2000-memory.dmp
        Filesize

        2.6MB

      • memory/1932-79-0x0000000002300000-0x0000000002440000-memory.dmp
        Filesize

        1.2MB

      • memory/1932-71-0x0000000000140000-0x00000000003D2000-memory.dmp
        Filesize

        2.6MB

      • memory/1932-82-0x000007FEFBD21000-0x000007FEFBD23000-memory.dmp
        Filesize

        8KB

      • memory/2044-73-0x00000000043B0000-0x00000000044F0000-memory.dmp
        Filesize

        1.2MB

      • memory/2044-75-0x00000000041F0000-0x0000000004330000-memory.dmp
        Filesize

        1.2MB

      • memory/2044-74-0x00000000041F0000-0x0000000004330000-memory.dmp
        Filesize

        1.2MB

      • memory/2044-77-0x0000000004C90000-0x00000000057F1000-memory.dmp
        Filesize

        11.4MB

      • memory/2044-70-0x00000000043B0000-0x00000000044F0000-memory.dmp
        Filesize

        1.2MB

      • memory/2044-69-0x00000000041F0000-0x0000000004330000-memory.dmp
        Filesize

        1.2MB

      • memory/2044-68-0x00000000041F0000-0x0000000004330000-memory.dmp
        Filesize

        1.2MB

      • memory/2044-67-0x0000000004C90000-0x00000000057F1000-memory.dmp
        Filesize

        11.4MB

      • memory/2044-66-0x0000000004C90000-0x00000000057F1000-memory.dmp
        Filesize

        11.4MB

      • memory/2044-64-0x0000000004C90000-0x00000000057F1000-memory.dmp
        Filesize

        11.4MB

      • memory/2044-56-0x0000000000000000-mapping.dmp