Analysis

  • max time kernel
    169s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 14:32

General

  • Target

    def365ceb940194df5ad51a76c02e2cf4e6f3dba24353347edb5f3fa58d62b53.exe

  • Size

    8.5MB

  • MD5

    663e2e8897e764c6853d936e6be2243b

  • SHA1

    b19d36acab4474af88e3316d3afb71ad2a9b91f9

  • SHA256

    def365ceb940194df5ad51a76c02e2cf4e6f3dba24353347edb5f3fa58d62b53

  • SHA512

    07fef6d438fd0287243aea945a02f9fb8fe57f983f9351e4f758c48bf65ec3b691521143d87ab7501828a97ae8a2bac682b7688dbd06ad58f8c66e3e5a783369

  • SSDEEP

    196608:nSX0XZV9sWoOB0zaHfqa6leXKdhHSklX06F9ZyBSXPgoSbuJAW8:nSkzZ2za/N+eX+H5Xx9Z6SopAAW8

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 33 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 53 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\def365ceb940194df5ad51a76c02e2cf4e6f3dba24353347edb5f3fa58d62b53.exe
    "C:\Users\Admin\AppData\Local\Temp\def365ceb940194df5ad51a76c02e2cf4e6f3dba24353347edb5f3fa58d62b53.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4328
    • C:\Users\Admin\AppData\Local\Temp\{1E4D7FA8-1FD7-4620-A58C-3FAF74014CC5}\supoptsetup.exe
      /VERYSILENT
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:220
      • C:\Users\Admin\AppData\Local\Temp\is-VHNH5.tmp\supoptsetup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-VHNH5.tmp\supoptsetup.tmp" /SL5="$80048,7226305,643584,C:\Users\Admin\AppData\Local\Temp\{1E4D7FA8-1FD7-4620-A58C-3FAF74014CC5}\supoptsetup.exe" /VERYSILENT
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\Super Optimizer\SupOptCrash.dll",ENT -install
          4⤵
          • Loads dropped DLL
          PID:3804
        • C:\Program Files (x86)\Super Optimizer\SupOptStart.exe
          "C:\Program Files (x86)\Super Optimizer\SupOptStart.exe"
          4⤵
          • Executes dropped EXE
          PID:4212
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\Super Optimizer\SupOptCrash.dll",ENT
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\Program Files (x86)\Super Optimizer\SupOptCrash.dll",ENT
      2⤵
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      PID:2316

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Super Optimizer\SupOptCrash.dll
    Filesize

    3.8MB

    MD5

    87a2604a3b414f8817016d33b06a31f9

    SHA1

    96b5db8bc388fdb38b197bdd140fc25528c2bf10

    SHA256

    1e8808d8ce63b3a57f06f1de1dd861bdb39bb9b84c3708373e8e5cea22e64e88

    SHA512

    cd4103c0b74b6397363df979bfe132f89dcdc45bdb09c33fe28de37574b5bb2eadae5c18e873ae6f0b7dbd866c62a9053d14a11b964a3bddb4e6d1fca247b662

  • C:\Program Files (x86)\Super Optimizer\SupOptCrash.dll
    Filesize

    3.8MB

    MD5

    87a2604a3b414f8817016d33b06a31f9

    SHA1

    96b5db8bc388fdb38b197bdd140fc25528c2bf10

    SHA256

    1e8808d8ce63b3a57f06f1de1dd861bdb39bb9b84c3708373e8e5cea22e64e88

    SHA512

    cd4103c0b74b6397363df979bfe132f89dcdc45bdb09c33fe28de37574b5bb2eadae5c18e873ae6f0b7dbd866c62a9053d14a11b964a3bddb4e6d1fca247b662

  • C:\Program Files (x86)\Super Optimizer\SupOptStart.exe
    Filesize

    1.1MB

    MD5

    d5ba50dcf68c6a32a6454143737cd7d1

    SHA1

    962fd06b079a90cb782f2617b70bd2778460208f

    SHA256

    a7f01c46b7d9b6b1dcc3f6f734b8b6eba7df52669a9fe9dda274ff92023db54f

    SHA512

    0d6fea0101e7b8f92c7f2a65c1723422f3c74463756e96d1d833356b7dfdc5bc784aa08d889b1de94d64aa8098535a7736a2127c8d790b4186dc58a21e69fc26

  • C:\Program Files (x86)\Super Optimizer\SupOptStart.exe
    Filesize

    1.1MB

    MD5

    d5ba50dcf68c6a32a6454143737cd7d1

    SHA1

    962fd06b079a90cb782f2617b70bd2778460208f

    SHA256

    a7f01c46b7d9b6b1dcc3f6f734b8b6eba7df52669a9fe9dda274ff92023db54f

    SHA512

    0d6fea0101e7b8f92c7f2a65c1723422f3c74463756e96d1d833356b7dfdc5bc784aa08d889b1de94d64aa8098535a7736a2127c8d790b4186dc58a21e69fc26

  • C:\Users\Admin\AppData\Local\Temp\is-LM1LF.tmp\SupOptCrash.dll
    Filesize

    3.8MB

    MD5

    87a2604a3b414f8817016d33b06a31f9

    SHA1

    96b5db8bc388fdb38b197bdd140fc25528c2bf10

    SHA256

    1e8808d8ce63b3a57f06f1de1dd861bdb39bb9b84c3708373e8e5cea22e64e88

    SHA512

    cd4103c0b74b6397363df979bfe132f89dcdc45bdb09c33fe28de37574b5bb2eadae5c18e873ae6f0b7dbd866c62a9053d14a11b964a3bddb4e6d1fca247b662

  • C:\Users\Admin\AppData\Local\Temp\is-VHNH5.tmp\supoptsetup.tmp
    Filesize

    1.6MB

    MD5

    0b6042a0d575c24ca67657fefb70649a

    SHA1

    58bca3c01571945cc60904e7c4274070a8c1c564

    SHA256

    b2461953108aa78a1ed07ab0652bfa21e1902ea45d403e4789901027e3605cef

    SHA512

    3d5b8737d21681c178fd82770589c14b4e09e7ed526e4b82d87d187030ac9b61212a046f697b7cb80b62771af88a9cc738388195b59c34c63d666f1624bdc328

  • C:\Users\Admin\AppData\Local\Temp\is-VHNH5.tmp\supoptsetup.tmp
    Filesize

    1.6MB

    MD5

    0b6042a0d575c24ca67657fefb70649a

    SHA1

    58bca3c01571945cc60904e7c4274070a8c1c564

    SHA256

    b2461953108aa78a1ed07ab0652bfa21e1902ea45d403e4789901027e3605cef

    SHA512

    3d5b8737d21681c178fd82770589c14b4e09e7ed526e4b82d87d187030ac9b61212a046f697b7cb80b62771af88a9cc738388195b59c34c63d666f1624bdc328

  • C:\Users\Admin\AppData\Local\Temp\{1E4D7FA8-1FD7-4620-A58C-3FAF74014CC5}\supoptsetup.exe
    Filesize

    7.5MB

    MD5

    74a2f97a1ad83d19a9ba09826846ccf7

    SHA1

    25fc422ea21b5de0bb14e9ec2b34edd0fbcbaff4

    SHA256

    57dc6f82e0bbe3e456c16e4cd2625b80756ae6074489754d6c0e19b0319bfb1f

    SHA512

    e4087dd7d441a487922b9e78f892d621b25384e5c7125e9112d9c84038038ab51cf427e89336bf8286f54142d325a57db868c2f27f5c38e6602d476995e4b12f

  • C:\Users\Admin\AppData\Local\Temp\{1E4D7FA8-1FD7-4620-A58C-3FAF74014CC5}\supoptsetup.exe
    Filesize

    7.5MB

    MD5

    74a2f97a1ad83d19a9ba09826846ccf7

    SHA1

    25fc422ea21b5de0bb14e9ec2b34edd0fbcbaff4

    SHA256

    57dc6f82e0bbe3e456c16e4cd2625b80756ae6074489754d6c0e19b0319bfb1f

    SHA512

    e4087dd7d441a487922b9e78f892d621b25384e5c7125e9112d9c84038038ab51cf427e89336bf8286f54142d325a57db868c2f27f5c38e6602d476995e4b12f

  • \??\c:\Program Files (x86)\Super Optimizer\SupOptCrash.dll
    Filesize

    3.8MB

    MD5

    87a2604a3b414f8817016d33b06a31f9

    SHA1

    96b5db8bc388fdb38b197bdd140fc25528c2bf10

    SHA256

    1e8808d8ce63b3a57f06f1de1dd861bdb39bb9b84c3708373e8e5cea22e64e88

    SHA512

    cd4103c0b74b6397363df979bfe132f89dcdc45bdb09c33fe28de37574b5bb2eadae5c18e873ae6f0b7dbd866c62a9053d14a11b964a3bddb4e6d1fca247b662

  • memory/220-166-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/220-137-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/220-147-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/220-135-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/220-132-0x0000000000000000-mapping.dmp
  • memory/2316-156-0x0000000000000000-mapping.dmp
  • memory/2316-158-0x0000000001980000-0x0000000001CC7000-memory.dmp
    Filesize

    3.3MB

  • memory/2536-142-0x0000000006440000-0x0000000006787000-memory.dmp
    Filesize

    3.3MB

  • memory/2536-138-0x0000000000000000-mapping.dmp
  • memory/3804-151-0x0000000002160000-0x00000000024A7000-memory.dmp
    Filesize

    3.3MB

  • memory/3804-148-0x0000000000000000-mapping.dmp
  • memory/4212-163-0x0000000000000000-mapping.dmp