Analysis

  • max time kernel
    152s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-11-2022 09:32

General

  • Target

    fb17777e718f2adc03db114f451282de316f96eba97841c8dff06614fbc4e254.exe

  • Size

    976KB

  • MD5

    5a8a97f16321051d1c313b284c798bdb

  • SHA1

    73aa1fb21ad3f7baeac25b00927d2b9c7fdb35a9

  • SHA256

    fb17777e718f2adc03db114f451282de316f96eba97841c8dff06614fbc4e254

  • SHA512

    f33203a3ebaa65d56318ff2266f5e36819d2148a16c4cba4d47ee4a1576d800837acafc06c293dde45985c37b3acc0ad11a7e86c679b88681bb609327db2bde7

  • SSDEEP

    12288:yjDOET/hM0s51zHivMS++WBPKIxbxRoh2stp24In9L+00e/IZwO8dwGxxaWcuJdc:IDOENMZcMhK8tRobe/8CdHxa7uJUp7

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 27 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb17777e718f2adc03db114f451282de316f96eba97841c8dff06614fbc4e254.exe
    "C:\Users\Admin\AppData\Local\Temp\fb17777e718f2adc03db114f451282de316f96eba97841c8dff06614fbc4e254.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Tdryuqayh.tmp",Worhdhqfpryr
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:2040
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 20117
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3560
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:4912
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4588
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
            3⤵
              PID:1284
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:4516

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Tdryuqayh.tmp
            Filesize

            767KB

            MD5

            d8ca174a8f3f0c225429e1be1cb6d304

            SHA1

            0f2e738b1a35b6072e1d23894468e45fa7dee750

            SHA256

            3d63ad175a34e4c89ea6eca4a1161bb5dd514a5e58302707edc03473eb1f656e

            SHA512

            dbf999a9f0399b3cbf93484f2e665e3beb4de369dacf4678c7b7b3ff06f45c42879c544c2404d85b88fe3aaacf117a1e28ecb68ee7ea2553b736bad03619e527

          • \Users\Admin\AppData\Local\Temp\Tdryuqayh.tmp
            Filesize

            767KB

            MD5

            d8ca174a8f3f0c225429e1be1cb6d304

            SHA1

            0f2e738b1a35b6072e1d23894468e45fa7dee750

            SHA256

            3d63ad175a34e4c89ea6eca4a1161bb5dd514a5e58302707edc03473eb1f656e

            SHA512

            dbf999a9f0399b3cbf93484f2e665e3beb4de369dacf4678c7b7b3ff06f45c42879c544c2404d85b88fe3aaacf117a1e28ecb68ee7ea2553b736bad03619e527

          • memory/1284-345-0x0000000000000000-mapping.dmp
          • memory/2040-177-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-176-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-300-0x00000000065C0000-0x0000000007139000-memory.dmp
            Filesize

            11.5MB

          • memory/2040-185-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-184-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-183-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-182-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-181-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-180-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-179-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-178-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-161-0x0000000000000000-mapping.dmp
          • memory/2040-175-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-262-0x00000000065C0000-0x0000000007139000-memory.dmp
            Filesize

            11.5MB

          • memory/2040-174-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-173-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-172-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-171-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-170-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-169-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-167-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-168-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-164-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-166-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-163-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2040-162-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-137-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-116-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-148-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-149-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-150-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-151-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-152-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-153-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-154-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-155-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-156-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-157-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-158-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-159-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-160-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-146-0x0000000000400000-0x0000000000BA6000-memory.dmp
            Filesize

            7.6MB

          • memory/2668-145-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-144-0x0000000002A70000-0x0000000002B90000-memory.dmp
            Filesize

            1.1MB

          • memory/2668-165-0x0000000000400000-0x0000000000BA6000-memory.dmp
            Filesize

            7.6MB

          • memory/2668-143-0x0000000002990000-0x0000000002A70000-memory.dmp
            Filesize

            896KB

          • memory/2668-142-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-141-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-140-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-139-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-136-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-147-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-135-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-132-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-134-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-133-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-131-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-130-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-129-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-128-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-127-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-126-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-125-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-124-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-123-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-122-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-121-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-120-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-119-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-117-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/2668-118-0x00000000779A0000-0x0000000077B2E000-memory.dmp
            Filesize

            1.6MB

          • memory/3560-283-0x000001E836DA0000-0x000001E83705C000-memory.dmp
            Filesize

            2.7MB

          • memory/3560-299-0x000001E836DA0000-0x000001E83705C000-memory.dmp
            Filesize

            2.7MB

          • memory/3560-281-0x0000000000AE0000-0x0000000000D8B000-memory.dmp
            Filesize

            2.7MB

          • memory/3560-277-0x00007FF7A1E85FD0-mapping.dmp
          • memory/4588-327-0x0000000000000000-mapping.dmp
          • memory/4912-309-0x0000000000000000-mapping.dmp