Analysis

  • max time kernel
    123s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2022 11:59

General

  • Target

    a0f0a5939391e1e6435891fcbd3c1f8f.exe

  • Size

    1.1MB

  • MD5

    a0f0a5939391e1e6435891fcbd3c1f8f

  • SHA1

    240a65e3b2fc037e23b631689bdf2b56089b5ff1

  • SHA256

    025208b3d2dc191ade69d312f02ae794a9a1b03952e959d7031460aa0100d23c

  • SHA512

    e8f8acb13fc39a61e277ec562fb72a3381a6a2b6c912aa17b121010cc04b16b0406f69fafd36029106e6a258155f9a01470af551d63ed8e25dd908960e40030c

  • SSDEEP

    24576:Xo3ciGhHIfz+y/iHemincy/2JIGJZwYKl6cE5CjmXNeEh:XEGZIfzuHeminIN9Q61CjsN9

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 41 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0f0a5939391e1e6435891fcbd3c1f8f.exe
    "C:\Users\Admin\AppData\Local\Temp\a0f0a5939391e1e6435891fcbd3c1f8f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp",Dsdupihuqo
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 22341
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:852
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:1064
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:1048
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe -k LocalService
        1⤵
        • Loads dropped DLL
        • Checks processor information in registry
        PID:872
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windows mail\ja-jp\adobeupdaterinstallmgr.dll",XzYpTTd0
          2⤵
            PID:444

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        2
        T1060

        Defense Evasion

        Modify Registry

        2
        T1112

        Discovery

        Query Registry

        2
        T1012

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Darpeiwtweqqp.tmp
          Filesize

          3.5MB

          MD5

          79796bc6de8854acabc129822a09c4f5

          SHA1

          262f5137bc03ecaf7a9583c7e95f10343975c57c

          SHA256

          bd273701d734c094df102149e30cd1802f0944ddc714a41c20dcd21f46b859f8

          SHA512

          396213578078c7f4f6968da317bd1be373c19596af7dfa67e2c4debefa5406fb7be72e421b551fcdb160a2cd976a324ce851d4fad94d5f32906b46156075115f

        • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Darpeiwtweqqp.tmp
          Filesize

          3.5MB

          MD5

          1952cce958d7926ea0298cac7418a915

          SHA1

          9bf8adfccae3528f7d6d8a19416e37b9d8390a83

          SHA256

          a1651d2139e0d4a67afaf215cd902d16aee083738879e1b2a4ea5bf44058d932

          SHA512

          49529f1e7f7008035b3ff73d97bebc0e09e7d546a3214e253ce7883bd0ff1a356cfd629d9503a5b5a84d8eb9df1939aebd95ad16e8edde1f9cb65cd74f058116

        • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\MAPIR.DLL.trx_dll
          Filesize

          287KB

          MD5

          fab60173e484e3eec40122a0a18d5bf6

          SHA1

          88faac2ecb2f3f7bca694aa6a5bf024218e17258

          SHA256

          1f763bcf9755a67768768ebbe91b6b05cbff51072133135c4dc92c045cc0df07

          SHA512

          ef8089ab561c10ce5747b91a3201d063d2eb3d8bc2ab9bdaf69df97ef615d857cfea34f00c696e0695babbac050445de8daaf48448d2a36e6a1a2c9285546bb4

        • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\OUTLLIBR.REST.trx_dll
          Filesize

          665KB

          MD5

          753df8b9141a1939d4454d07aed78e06

          SHA1

          514d203a4a8e8a26c8def2c4c21d34da7c5a8243

          SHA256

          91f6c4f198a868abbd3f7cf31373d8e65618092f680be3304b77d66fedabb7d0

          SHA512

          d280ed303c8e51dc5b60357a83839d1ad4ac5ced836422649c88616063e46b88c5c713707b448e192a5b429ac815c8d3eeff27fbb3dbf1b373414cee8e3ee880

        • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\ppcrlui.dll
          Filesize

          248KB

          MD5

          046a9363a58f8c4105e5871a514b63cc

          SHA1

          2656816adb38ea616506b8b5f7db49e53a3ba28c

          SHA256

          c1f80d9e281441239c5f40d8ae18a867b2d517385d16fd05c122a0b2716cba56

          SHA512

          0d12c72d6f7cd9652afdde3e9e10e678c31e11a5f37991d5c7e73617f361d7636b76e8579ec7c8e32caa5d35271224dc182833378b9d63f90b6019a1aefa160c

        • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\print_pref.ico
          Filesize

          56KB

          MD5

          a52a082f2b18811deaf3138d27c57af8

          SHA1

          317bf685e50de705818bff26f032e7f593830509

          SHA256

          6b4b668a30271d7853257b5752dc429b39c7b264e77ff3533196e6fd03fbeb88

          SHA512

          0d6f4bbb993b4e9a0069ddd0503ceb45d8a1cc6f6453cc2faf91cb137fa49e15eeaa3d77cb9954cc07701153932da51977d467c54b1e0fcfe74b6670cac47d99

        • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\usertile43.bmp
          Filesize

          48KB

          MD5

          bf54b355d171471bece614e6583488b2

          SHA1

          3556f13234855d9c74d7100d8d3c229a496f7f72

          SHA256

          6403db3597d8f33188d0fe0cc1ff166c7cf91df5c6f19db36002eb6b5481c892

          SHA512

          50f4c61a86e1593f791c5bd9feab43ce63b162212815594de7057bb8038b65ed9efd41cd6e38e62bf644c6f23953b0c10ebf6d8afc08ef9b62c77806aff98fd6

        • C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp
          Filesize

          792KB

          MD5

          9e3ff54c77c7d43bfdf8cff1d31c3c51

          SHA1

          9681f127f0300093ac15d8a3fc16c289f0b9c045

          SHA256

          2c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d

          SHA512

          d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec

        • \??\c:\program files (x86)\windows mail\ja-jp\adobeupdaterinstallmgr.dll
          Filesize

          792KB

          MD5

          cf8ef4a392c6c75b6b792fb8a42abf55

          SHA1

          b2e68b02f7dff801af2b7d05317b49306d91fbcd

          SHA256

          9120f0ac91bbde09e92f1496a6ac0a27cda033a9fe7bdf53b000919f93cec41c

          SHA512

          e0ff961d26228fd9a1384dae1dfe7df3b36e9aa2b8f43ebe20c5c41e6e0b35d83200ef1256eeff6f0e31b37a29a931ccb1d46ea32b05388258dec08a898ece04

        • \Program Files (x86)\Windows Mail\ja-JP\AdobeUpdaterInstallMgr.dll
          Filesize

          792KB

          MD5

          cf8ef4a392c6c75b6b792fb8a42abf55

          SHA1

          b2e68b02f7dff801af2b7d05317b49306d91fbcd

          SHA256

          9120f0ac91bbde09e92f1496a6ac0a27cda033a9fe7bdf53b000919f93cec41c

          SHA512

          e0ff961d26228fd9a1384dae1dfe7df3b36e9aa2b8f43ebe20c5c41e6e0b35d83200ef1256eeff6f0e31b37a29a931ccb1d46ea32b05388258dec08a898ece04

        • \Program Files (x86)\Windows Mail\ja-JP\AdobeUpdaterInstallMgr.dll
          Filesize

          792KB

          MD5

          cf8ef4a392c6c75b6b792fb8a42abf55

          SHA1

          b2e68b02f7dff801af2b7d05317b49306d91fbcd

          SHA256

          9120f0ac91bbde09e92f1496a6ac0a27cda033a9fe7bdf53b000919f93cec41c

          SHA512

          e0ff961d26228fd9a1384dae1dfe7df3b36e9aa2b8f43ebe20c5c41e6e0b35d83200ef1256eeff6f0e31b37a29a931ccb1d46ea32b05388258dec08a898ece04

        • \Program Files (x86)\Windows Mail\ja-JP\AdobeUpdaterInstallMgr.dll
          Filesize

          792KB

          MD5

          cf8ef4a392c6c75b6b792fb8a42abf55

          SHA1

          b2e68b02f7dff801af2b7d05317b49306d91fbcd

          SHA256

          9120f0ac91bbde09e92f1496a6ac0a27cda033a9fe7bdf53b000919f93cec41c

          SHA512

          e0ff961d26228fd9a1384dae1dfe7df3b36e9aa2b8f43ebe20c5c41e6e0b35d83200ef1256eeff6f0e31b37a29a931ccb1d46ea32b05388258dec08a898ece04

        • \Program Files (x86)\Windows Mail\ja-JP\AdobeUpdaterInstallMgr.dll
          Filesize

          792KB

          MD5

          cf8ef4a392c6c75b6b792fb8a42abf55

          SHA1

          b2e68b02f7dff801af2b7d05317b49306d91fbcd

          SHA256

          9120f0ac91bbde09e92f1496a6ac0a27cda033a9fe7bdf53b000919f93cec41c

          SHA512

          e0ff961d26228fd9a1384dae1dfe7df3b36e9aa2b8f43ebe20c5c41e6e0b35d83200ef1256eeff6f0e31b37a29a931ccb1d46ea32b05388258dec08a898ece04

        • \Program Files (x86)\Windows Mail\ja-JP\AdobeUpdaterInstallMgr.dll
          Filesize

          792KB

          MD5

          cf8ef4a392c6c75b6b792fb8a42abf55

          SHA1

          b2e68b02f7dff801af2b7d05317b49306d91fbcd

          SHA256

          9120f0ac91bbde09e92f1496a6ac0a27cda033a9fe7bdf53b000919f93cec41c

          SHA512

          e0ff961d26228fd9a1384dae1dfe7df3b36e9aa2b8f43ebe20c5c41e6e0b35d83200ef1256eeff6f0e31b37a29a931ccb1d46ea32b05388258dec08a898ece04

        • \Program Files\Mozilla Firefox\firefox.exe
          Filesize

          562KB

          MD5

          d388df6ed5ccbf1acdeda5af2d18cb0b

          SHA1

          124d3c2ba93644ac6c2d7253de242b46be836692

          SHA256

          8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

          SHA512

          f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

        • \Program Files\Mozilla Firefox\firefox.exe
          Filesize

          562KB

          MD5

          d388df6ed5ccbf1acdeda5af2d18cb0b

          SHA1

          124d3c2ba93644ac6c2d7253de242b46be836692

          SHA256

          8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

          SHA512

          f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

        • \Program Files\Mozilla Firefox\firefox.exe
          Filesize

          562KB

          MD5

          d388df6ed5ccbf1acdeda5af2d18cb0b

          SHA1

          124d3c2ba93644ac6c2d7253de242b46be836692

          SHA256

          8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

          SHA512

          f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

        • \Program Files\Mozilla Firefox\firefox.exe
          Filesize

          562KB

          MD5

          d388df6ed5ccbf1acdeda5af2d18cb0b

          SHA1

          124d3c2ba93644ac6c2d7253de242b46be836692

          SHA256

          8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

          SHA512

          f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

        • \Users\Admin\AppData\Local\Temp\Dfuqft.tmp
          Filesize

          792KB

          MD5

          9e3ff54c77c7d43bfdf8cff1d31c3c51

          SHA1

          9681f127f0300093ac15d8a3fc16c289f0b9c045

          SHA256

          2c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d

          SHA512

          d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec

        • memory/444-106-0x00000000041C0000-0x0000000004D17000-memory.dmp
          Filesize

          11.3MB

        • memory/444-96-0x0000000000000000-mapping.dmp
        • memory/444-102-0x00000000041C0000-0x0000000004D17000-memory.dmp
          Filesize

          11.3MB

        • memory/444-105-0x00000000041C0000-0x0000000004D17000-memory.dmp
          Filesize

          11.3MB

        • memory/852-80-0x0000000001EB0000-0x000000000216F000-memory.dmp
          Filesize

          2.7MB

        • memory/852-77-0x0000000002170000-0x00000000022B0000-memory.dmp
          Filesize

          1.2MB

        • memory/852-70-0x0000000000240000-0x00000000004EE000-memory.dmp
          Filesize

          2.7MB

        • memory/852-79-0x0000000000240000-0x00000000004EE000-memory.dmp
          Filesize

          2.7MB

        • memory/852-78-0x000007FEFC3C1000-0x000007FEFC3C3000-memory.dmp
          Filesize

          8KB

        • memory/852-75-0x00000000FF863CEC-mapping.dmp
        • memory/852-76-0x0000000002170000-0x00000000022B0000-memory.dmp
          Filesize

          1.2MB

        • memory/872-112-0x0000000004260000-0x0000000004DB7000-memory.dmp
          Filesize

          11.3MB

        • memory/872-86-0x0000000004260000-0x0000000004DB7000-memory.dmp
          Filesize

          11.3MB

        • memory/872-88-0x0000000004260000-0x0000000004DB7000-memory.dmp
          Filesize

          11.3MB

        • memory/872-89-0x0000000004260000-0x0000000004DB7000-memory.dmp
          Filesize

          11.3MB

        • memory/1048-113-0x0000000000000000-mapping.dmp
        • memory/1064-111-0x0000000000000000-mapping.dmp
        • memory/1100-65-0x0000000004D00000-0x0000000005857000-memory.dmp
          Filesize

          11.3MB

        • memory/1100-69-0x00000000046A0000-0x00000000047E0000-memory.dmp
          Filesize

          1.2MB

        • memory/1100-81-0x0000000004D00000-0x0000000005857000-memory.dmp
          Filesize

          11.3MB

        • memory/1100-66-0x0000000004D00000-0x0000000005857000-memory.dmp
          Filesize

          11.3MB

        • memory/1100-56-0x0000000000000000-mapping.dmp
        • memory/1100-74-0x00000000046A0000-0x00000000047E0000-memory.dmp
          Filesize

          1.2MB

        • memory/1100-73-0x00000000046A0000-0x00000000047E0000-memory.dmp
          Filesize

          1.2MB

        • memory/1100-68-0x00000000046A0000-0x00000000047E0000-memory.dmp
          Filesize

          1.2MB

        • memory/1100-67-0x00000000046A0000-0x00000000047E0000-memory.dmp
          Filesize

          1.2MB

        • memory/1100-72-0x00000000046A0000-0x00000000047E0000-memory.dmp
          Filesize

          1.2MB

        • memory/1100-63-0x0000000004D00000-0x0000000005857000-memory.dmp
          Filesize

          11.3MB

        • memory/1396-57-0x0000000001EA0000-0x0000000001F8C000-memory.dmp
          Filesize

          944KB

        • memory/1396-60-0x0000000000400000-0x0000000000538000-memory.dmp
          Filesize

          1.2MB

        • memory/1396-58-0x0000000002010000-0x0000000002142000-memory.dmp
          Filesize

          1.2MB

        • memory/1396-55-0x00000000759F1000-0x00000000759F3000-memory.dmp
          Filesize

          8KB

        • memory/1396-54-0x0000000001EA0000-0x0000000001F8C000-memory.dmp
          Filesize

          944KB