Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2022, 14:40

General

  • Target

    48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63.exe

  • Size

    1.1MB

  • MD5

    c551a87ede300f78a48fadfe6c7b14af

  • SHA1

    4c4c5cd829fe657d640dfd4baf356a45e55e13ee

  • SHA256

    48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63

  • SHA512

    7eb738ea5644937c5e09b7218801ffee25d6f009be7a8d8afd1e8f4fff35b57f09ca044df84edbafe8dbed3a7c7bf766e6dcca7fda1f2b67e2d5e017c2dae67b

  • SSDEEP

    24576:MINJmEwrc3nPabM8SA1kHSvNIJdTKlwZ8a8dh4u:MINj0c3PwM8SA1kA7li2

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 43 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 63 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63.exe
    "C:\Users\Admin\AppData\Local\Temp\48c4ac00c8bea03f17cea62ec021dcd3ddd50db8bb9c85ee0ffba68b970daf63.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp",Dsdupihuqo
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:396
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 22317
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1992
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:2816
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4748
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 528
          2⤵
          • Program crash
          PID:2180
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1432 -ip 1432
        1⤵
          PID:3688
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:2040
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k LocalService
            1⤵
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4560
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windows sidebar\shared gadgets\aic_file_icons_retina_thumb_highcontrast_bow.dll",UxY9bTRR
              2⤵
              • Loads dropped DLL
              • Checks processor information in registry
              PID:1824

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\aic_file_icons_retina_thumb_highContrast_bow.dll

            Filesize

            792KB

            MD5

            f71ab7e910c7d5abdd11f949a7ad37bd

            SHA1

            66ebd3fe09df04647b6bc762d92b6282a41a2890

            SHA256

            590a1d25bfb1ea248a6c65510127dd94df99a44cab8a83ef66d3fd91574cfcc8

            SHA512

            50ba6e7ab47718aed2db3b229f97d2cc464bc5a1e6b0af0ce1bf9c2a1639ac44f98a46b993b25348d14c8c7989ba927b8d1e40387f89834cb35afa15ed63350c

          • C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\aic_file_icons_retina_thumb_highContrast_bow.dll

            Filesize

            792KB

            MD5

            f71ab7e910c7d5abdd11f949a7ad37bd

            SHA1

            66ebd3fe09df04647b6bc762d92b6282a41a2890

            SHA256

            590a1d25bfb1ea248a6c65510127dd94df99a44cab8a83ef66d3fd91574cfcc8

            SHA512

            50ba6e7ab47718aed2db3b229f97d2cc464bc5a1e6b0af0ce1bf9c2a1639ac44f98a46b993b25348d14c8c7989ba927b8d1e40387f89834cb35afa15ed63350c

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Darpeiwtweqqp.tmp

            Filesize

            3.5MB

            MD5

            7b84847b4cb1136fab547e34cdb71db3

            SHA1

            6d55d0fb517393c38afc55f328e2acc85f8f0731

            SHA256

            5cfa862af6313b07b0adcfb84bc4e70ede4fb30698f5ca884de60f720d4651f2

            SHA512

            25788488d8a23913740b903122f3f1a330f45da75c5f4c72933d437762845417fd46ba98a8b394e279f8334fdbe320c5333118d2f91fc69cdf84263d47a20b03

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Darpeiwtweqqp.tmp

            Filesize

            3.5MB

            MD5

            21df73c9f90990ca8aad276e91a4bb6c

            SHA1

            8e8a9a8b78a2651f02cb557c611370e98ed1922b

            SHA256

            cffac2590116d0448b58c12a4eaba66fb9f379748cb35b4e60335d7b62403347

            SHA512

            e06174325e68a66d7deee86b5ee597a6ef3fd56267584d503883a0bd271968ebc08881bb387cf77d27c14d6841f50c4f8446b57e06bd0755716cec6d7b561575

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Diagtrack-Listener.etl

            Filesize

            128KB

            MD5

            92940338867c5a5280e1dfb5261ee87b

            SHA1

            f233ac37ca6cef59690eab0df1a963c2d40e25f5

            SHA256

            858c25b50b1eeb51fa5b49fe8f60404126b4c1ebd511b2270eac082b01cd5949

            SHA512

            37751bf504d67409da9f03162e2c794290f46d883202f5c8517897d87b47409e01e9efaf45b569568e98eaec61630a8be953133f0d83820092a9092b83ecf0eb

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\SettingsLocationTemplate2013A.xsd

            Filesize

            13KB

            MD5

            91452b27335b69acc128a8a841bfe405

            SHA1

            7d63c758a2d4d16ef4175637ed17d5ad2080a329

            SHA256

            ce07da21a959291739ec76f403576ef995d1bb29826b490184c2fe6a4e5c7b10

            SHA512

            ba5ff3e4e596e685ec3dff0951c298c76fd2240f774d0d01b80bce6ad5e234a208d0f775c0d2b30d0b9dfefb3e8bce173db4b1e77a9ca16251dde662a005163b

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\qmgr.jfm

            Filesize

            16KB

            MD5

            94f42a18776c4c82e2943aa9743c76fc

            SHA1

            dbd6eef9c25ac632936e135214302f5890f9699f

            SHA256

            dd16e31d240dfa4cc5fd2394d42ebb21fbc42a141438b58bff23af7335aad5a6

            SHA512

            17a795b141da24aad43ae654167aba8c7c5de5df0149712600c649736bdcc14aacc3b5f12072b9e6b17a87bfee92a03654a2e05f6547986596b12d7d04c47644

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\resource.xml

            Filesize

            1KB

            MD5

            09e877cc25ec3ade6e0d56000025e7ae

            SHA1

            fef683c766926d84804867a6a711c200e2ceb406

            SHA256

            995f07448661dec2389b445cbe054e4fce31d07bed2f3f9f4bc94ee9a875fc92

            SHA512

            02b7ed4cba2f3b153f055c51b24eb4a7ca9cec136274a00fcc2efebd21ad410d826d92b0113229e2817930a6a84dfa27e809290cb0522535202116c24ac8f1a3

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\watermark.png

            Filesize

            28KB

            MD5

            1f93b502e78190a2f496c2d9558e069d

            SHA1

            6ae6249493d36682270c0d5e3eb3c472fdd2766e

            SHA256

            5c5b0de42d55486ed61dd3a6e96ab09f467bb38ae39fced97adc51ba07426c0e

            SHA512

            cf07724c203a82c9f202d53f63ea00ab0df2f97484bd3b9abe1a001f2e531f505ddd4ff8f2d5a2769dd9d2d60e9c1d03dd3ab5143542688f944cfd35c6f1cdf3

          • C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp

            Filesize

            792KB

            MD5

            9e3ff54c77c7d43bfdf8cff1d31c3c51

            SHA1

            9681f127f0300093ac15d8a3fc16c289f0b9c045

            SHA256

            2c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d

            SHA512

            d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec

          • C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp

            Filesize

            792KB

            MD5

            9e3ff54c77c7d43bfdf8cff1d31c3c51

            SHA1

            9681f127f0300093ac15d8a3fc16c289f0b9c045

            SHA256

            2c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d

            SHA512

            d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec

          • \??\c:\program files (x86)\windows sidebar\shared gadgets\aic_file_icons_retina_thumb_highcontrast_bow.dll

            Filesize

            792KB

            MD5

            f71ab7e910c7d5abdd11f949a7ad37bd

            SHA1

            66ebd3fe09df04647b6bc762d92b6282a41a2890

            SHA256

            590a1d25bfb1ea248a6c65510127dd94df99a44cab8a83ef66d3fd91574cfcc8

            SHA512

            50ba6e7ab47718aed2db3b229f97d2cc464bc5a1e6b0af0ce1bf9c2a1639ac44f98a46b993b25348d14c8c7989ba927b8d1e40387f89834cb35afa15ed63350c

          • memory/396-142-0x00000000057D0000-0x0000000005910000-memory.dmp

            Filesize

            1.2MB

          • memory/396-143-0x00000000057D0000-0x0000000005910000-memory.dmp

            Filesize

            1.2MB

          • memory/396-139-0x0000000004A70000-0x00000000055C7000-memory.dmp

            Filesize

            11.3MB

          • memory/396-141-0x00000000057D0000-0x0000000005910000-memory.dmp

            Filesize

            1.2MB

          • memory/396-140-0x00000000057D0000-0x0000000005910000-memory.dmp

            Filesize

            1.2MB

          • memory/396-138-0x0000000004A70000-0x00000000055C7000-memory.dmp

            Filesize

            11.3MB

          • memory/396-147-0x0000000005849000-0x000000000584B000-memory.dmp

            Filesize

            8KB

          • memory/396-145-0x00000000057D0000-0x0000000005910000-memory.dmp

            Filesize

            1.2MB

          • memory/396-152-0x0000000004A70000-0x00000000055C7000-memory.dmp

            Filesize

            11.3MB

          • memory/396-144-0x00000000057D0000-0x0000000005910000-memory.dmp

            Filesize

            1.2MB

          • memory/1432-137-0x0000000000400000-0x000000000053A000-memory.dmp

            Filesize

            1.2MB

          • memory/1432-135-0x0000000002430000-0x0000000002562000-memory.dmp

            Filesize

            1.2MB

          • memory/1432-134-0x000000000228E000-0x000000000237A000-memory.dmp

            Filesize

            944KB

          • memory/1824-167-0x0000000005280000-0x0000000005DD7000-memory.dmp

            Filesize

            11.3MB

          • memory/1824-168-0x0000000005280000-0x0000000005DD7000-memory.dmp

            Filesize

            11.3MB

          • memory/1992-151-0x00000000004E0000-0x000000000078E000-memory.dmp

            Filesize

            2.7MB

          • memory/1992-153-0x000002017A900000-0x000002017ABBF000-memory.dmp

            Filesize

            2.7MB

          • memory/1992-150-0x000002017A900000-0x000002017ABBF000-memory.dmp

            Filesize

            2.7MB

          • memory/1992-149-0x000002017C360000-0x000002017C4A0000-memory.dmp

            Filesize

            1.2MB

          • memory/1992-148-0x000002017C360000-0x000002017C4A0000-memory.dmp

            Filesize

            1.2MB

          • memory/4560-157-0x0000000004400000-0x0000000004F57000-memory.dmp

            Filesize

            11.3MB

          • memory/4560-166-0x0000000004400000-0x0000000004F57000-memory.dmp

            Filesize

            11.3MB

          • memory/4560-171-0x0000000004400000-0x0000000004F57000-memory.dmp

            Filesize

            11.3MB