Analysis

  • max time kernel
    162s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 15:47

General

  • Target

    ot.exe

  • Size

    77.3MB

  • MD5

    404aa3969362eb3eff49f02a22ac14bb

  • SHA1

    f60cc73a43cff70ec5386345793fc45406c6962d

  • SHA256

    f1da9552e6838feb549c6bb53f9d22d761c1c9446a86240dce31b1c10679df41

  • SHA512

    3c447cc169b4aaed98575d8413a99cadf600cc9810d0eabb757d219c1538d000b6edd99ee7383a558147d02b4e2a794b2b9cba753813256cd279e4bcd5e0b1d4

  • SSDEEP

    1572864:ycycjLk0uYgZAI+pcl2H5kYPc+miieYVThk7V63QoMEJ:yPxXYuR+phOYPc+hiP3iV6AoF

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ot.exe
    "C:\Users\Admin\AppData\Local\Temp\ot.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\SysWOW64\net.exe
      net stop OutlineService
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3588
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop OutlineService
        3⤵
          PID:3928
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c add_tap_device.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\SysWOW64\netsh.exe
          netsh interface show interface name=outline-tap0
          3⤵
            PID:3948
          • C:\Program Files (x86)\Outline\tap-windows6\tapinstall.exe
            tap-windows6\tapinstall install tap-windows6\OemVista.inf tap0901
            3⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Modifies system certificate store
            PID:4916
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
        1⤵
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3988
        • C:\Windows\system32\DrvInst.exe
          DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{f93eb85f-d268-2846-9e7c-b1710ab771a3}\oemvista.inf" "9" "4d14a44ff" "0000000000000138" "WinSta0\Default" "0000000000000150" "208" "c:\program files (x86)\outline\tap-windows6"
          2⤵
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:2196
          • C:\Windows\system32\rundll32.exe
            rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{ebdf6067-5649-d346-9dad-e78c64a5fb62} Global\{b6f8e7fb-9ee8-dc46-8cc2-139b5182ebf7} C:\Windows\System32\DriverStore\Temp\{8708e159-ad2f-cc4e-96ef-c42172c5affa}\oemvista.inf C:\Windows\System32\DriverStore\Temp\{8708e159-ad2f-cc4e-96ef-c42172c5affa}\tap0901.cat
            3⤵
            • Modifies system certificate store
            PID:3720

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Outline\add_tap_device.bat

        Filesize

        5KB

        MD5

        4a0f9ee182b115ac3411a92ff8f05fee

        SHA1

        03d3ad982761639c6186dc1f0aeff8ca40b77f75

        SHA256

        63d2244cb87521ca5dd5975052b5dc8301f6533cf91067b10c59cb678beb81ad

        SHA512

        92eb1e8022e7982b5ff56bd0c49be7943aaa2f0b60aba8bd4cc6e7ab3e7a49259e1cd4b46b8b76dd221b1a29e13e8a6b2cacee035a8b8bc2638246b8af951f14

      • C:\Program Files (x86)\Outline\tap-windows6\OemVista.inf

        Filesize

        7KB

        MD5

        87868193626dc756d10885f46d76f42e

        SHA1

        94a5ce8ed7633ed77531b6cb14ceb1927c5cae1f

        SHA256

        b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41

        SHA512

        79751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277

      • C:\Program Files (x86)\Outline\tap-windows6\tapinstall.exe

        Filesize

        99KB

        MD5

        33289e648328f3fd56501dd11c33c882

        SHA1

        195553c9e93b08dcc60708e8d8960aa33a41f835

        SHA256

        0e6ae4312a345b00e58329de41544f709021b24496ecb8ec8a06ae7ceab37ca9

        SHA512

        d9effe4b6c31edc0243c1bf4b91506188769ab0df5363e625abff55fad3a34b504d090dbbd42ccb77beea875b855f296d6ea49ff96ab4c0017ed42130c4a1fd3

      • C:\Program Files (x86)\Outline\tap-windows6\tapinstall.exe

        Filesize

        99KB

        MD5

        33289e648328f3fd56501dd11c33c882

        SHA1

        195553c9e93b08dcc60708e8d8960aa33a41f835

        SHA256

        0e6ae4312a345b00e58329de41544f709021b24496ecb8ec8a06ae7ceab37ca9

        SHA512

        d9effe4b6c31edc0243c1bf4b91506188769ab0df5363e625abff55fad3a34b504d090dbbd42ccb77beea875b855f296d6ea49ff96ab4c0017ed42130c4a1fd3

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\SpiderBanner.dll

        Filesize

        9KB

        MD5

        17309e33b596ba3a5693b4d3e85cf8d7

        SHA1

        7d361836cf53df42021c7f2b148aec9458818c01

        SHA256

        996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93

        SHA512

        1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\StdUtils.dll

        Filesize

        100KB

        MD5

        c6a6e03f77c313b267498515488c5740

        SHA1

        3d49fc2784b9450962ed6b82b46e9c3c957d7c15

        SHA256

        b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

        SHA512

        9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\System.dll

        Filesize

        12KB

        MD5

        0d7ad4f45dc6f5aa87f606d0331c6901

        SHA1

        48df0911f0484cbe2a8cdd5362140b63c41ee457

        SHA256

        3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

        SHA512

        c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\UserInfo.dll

        Filesize

        4KB

        MD5

        9eb662f3b5fbda28bffe020e0ab40519

        SHA1

        0bd28183a9d8dbb98afbcf100fb1f4f6c5fc6c41

        SHA256

        9aa388c7de8e96885adcb4325af871b470ac50edb60d4b0d876ad43f5332ffd1

        SHA512

        6c36f7b45efe792c21d8a87d03e63a4b641169fad6d014db1e7d15badd0e283144d746d888232d6123b551612173b2bb42bf05f16e3129b625f5ddba4134b5b8

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\WinShell.dll

        Filesize

        3KB

        MD5

        1cc7c37b7e0c8cd8bf04b6cc283e1e56

        SHA1

        0b9519763be6625bd5abce175dcc59c96d100d4c

        SHA256

        9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

        SHA512

        7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\WinShell.dll

        Filesize

        3KB

        MD5

        1cc7c37b7e0c8cd8bf04b6cc283e1e56

        SHA1

        0b9519763be6625bd5abce175dcc59c96d100d4c

        SHA256

        9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

        SHA512

        7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\WinShell.dll

        Filesize

        3KB

        MD5

        1cc7c37b7e0c8cd8bf04b6cc283e1e56

        SHA1

        0b9519763be6625bd5abce175dcc59c96d100d4c

        SHA256

        9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

        SHA512

        7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\WinShell.dll

        Filesize

        3KB

        MD5

        1cc7c37b7e0c8cd8bf04b6cc283e1e56

        SHA1

        0b9519763be6625bd5abce175dcc59c96d100d4c

        SHA256

        9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

        SHA512

        7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        ec0504e6b8a11d5aad43b296beeb84b2

        SHA1

        91b5ce085130c8c7194d66b2439ec9e1c206497c

        SHA256

        5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

        SHA512

        3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        ec0504e6b8a11d5aad43b296beeb84b2

        SHA1

        91b5ce085130c8c7194d66b2439ec9e1c206497c

        SHA256

        5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962

        SHA512

        3f918f1b47e8a919cbe51eb17dc30acc8cfc18e743a1bae5b787d0db7d26038dc1210be98bf5ba3be8d6ed896dbbd7ac3d13e66454a98b2a38c7e69dad30bb57

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\nsProcess.dll

        Filesize

        4KB

        MD5

        f0438a894f3a7e01a4aae8d1b5dd0289

        SHA1

        b058e3fcfb7b550041da16bf10d8837024c38bf6

        SHA256

        30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

        SHA512

        f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

      • C:\Users\Admin\AppData\Local\Temp\nsaE361.tmp\nsis7z.dll

        Filesize

        424KB

        MD5

        80e44ce4895304c6a3a831310fbf8cd0

        SHA1

        36bd49ae21c460be5753a904b4501f1abca53508

        SHA256

        b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

        SHA512

        c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

      • C:\Users\Admin\AppData\Local\Temp\{F93EB~1\tap0901.cat

        Filesize

        19KB

        MD5

        c757503bc0c5a6679e07fe15b93324d6

        SHA1

        6a81aa87e4b07c7fea176c8adf1b27ddcdd44573

        SHA256

        91ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e

        SHA512

        efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99

      • C:\Users\Admin\AppData\Local\Temp\{F93EB~1\tap0901.sys

        Filesize

        26KB

        MD5

        d765f43cbea72d14c04af3d2b9c8e54b

        SHA1

        daebe266073616e5fc931c319470fcf42a06867a

        SHA256

        89c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0

        SHA512

        ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2

      • C:\Users\Admin\AppData\Local\Temp\{f93eb85f-d268-2846-9e7c-b1710ab771a3}\oemvista.inf

        Filesize

        7KB

        MD5

        87868193626dc756d10885f46d76f42e

        SHA1

        94a5ce8ed7633ed77531b6cb14ceb1927c5cae1f

        SHA256

        b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41

        SHA512

        79751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277

      • C:\Windows\System32\DriverStore\Temp\{8708e159-ad2f-cc4e-96ef-c42172c5affa}\oemvista.inf

        Filesize

        7KB

        MD5

        87868193626dc756d10885f46d76f42e

        SHA1

        94a5ce8ed7633ed77531b6cb14ceb1927c5cae1f

        SHA256

        b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41

        SHA512

        79751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277

      • C:\Windows\System32\DriverStore\Temp\{8708e159-ad2f-cc4e-96ef-c42172c5affa}\tap0901.cat

        Filesize

        19KB

        MD5

        c757503bc0c5a6679e07fe15b93324d6

        SHA1

        6a81aa87e4b07c7fea176c8adf1b27ddcdd44573

        SHA256

        91ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e

        SHA512

        efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99

      • \??\c:\PROGRA~2\outline\TAP-WI~1\tap0901.sys

        Filesize

        26KB

        MD5

        d765f43cbea72d14c04af3d2b9c8e54b

        SHA1

        daebe266073616e5fc931c319470fcf42a06867a

        SHA256

        89c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0

        SHA512

        ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2

      • \??\c:\program files (x86)\outline\tap-windows6\tap0901.cat

        Filesize

        19KB

        MD5

        c757503bc0c5a6679e07fe15b93324d6

        SHA1

        6a81aa87e4b07c7fea176c8adf1b27ddcdd44573

        SHA256

        91ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e

        SHA512

        efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99

      • memory/2196-155-0x0000000000000000-mapping.dmp

      • memory/2540-146-0x0000000000000000-mapping.dmp

      • memory/3588-143-0x0000000000000000-mapping.dmp

      • memory/3720-159-0x0000000000000000-mapping.dmp

      • memory/3928-144-0x0000000000000000-mapping.dmp

      • memory/3948-148-0x0000000000000000-mapping.dmp

      • memory/4916-149-0x0000000000000000-mapping.dmp