Analysis

  • max time kernel
    134s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2022, 20:51

General

  • Target

    0ab75e895c519bf7b419f74fcd1c10704ba4900b7b355bd158d4f05d91899d5c.exe

  • Size

    1.1MB

  • MD5

    141b792875059eeb52d16c29c73ff7c6

  • SHA1

    5cea32e23cf8e965fde8ec18b2b5dc77a9e0fa9b

  • SHA256

    0ab75e895c519bf7b419f74fcd1c10704ba4900b7b355bd158d4f05d91899d5c

  • SHA512

    6cbf0891953e4dde57168e8a475c025ead813773f4215c73528da7443f880d96355cc2d89d26d8ec893bd4e1b305f0985aea42a47d1d8e751cf320b5f428a65f

  • SSDEEP

    24576:o12/s8LTn44mVihYySqkuFEZHIGJ3thWV5U/cpISQbp64ns691iGi:o12kcn49VihrFEl5h0tQbpns6ri

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 42 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 19 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ab75e895c519bf7b419f74fcd1c10704ba4900b7b355bd158d4f05d91899d5c.exe
    "C:\Users\Admin\AppData\Local\Temp\0ab75e895c519bf7b419f74fcd1c10704ba4900b7b355bd158d4f05d91899d5c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:812
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp",Dsdupihuqo
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 22347
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1220
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k LocalService
    1⤵
    • Loads dropped DLL
    PID:1640
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windows mail\ja-jp\readoutloud.dll",uGNVQWxQ
      2⤵
        PID:1988

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\CiPT0000.000

            Filesize

            240B

            MD5

            ce7bb913a634a680b928dc0de9d9f641

            SHA1

            8245ebf6e9d1dc5a312acb0b720bcd1f0a5ab825

            SHA256

            bd7381dc0824b857aab8922b3895bf56b7d15da2ea62ed17e3d5c680f35f0e8e

            SHA512

            578ac8a296e524b7379a77c161dd793e43f98f96dae8218090ce284ed9a4f822c160cedf8d0e3389e9b85b1e4662a65cd308d2dfa2373c95f8c9561eecbd7121

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\CiPT0000.001

            Filesize

            64KB

            MD5

            f1e25120fc2cfc90f2bd7be15a8601fe

            SHA1

            dbddccd08310cbf909fe64596397e3cb83452430

            SHA256

            ff90fd374351fda0564c78232deadb6c7ead13743c96faaffdaccc348a7364dc

            SHA512

            526083d41f038780bacd523dfc4b419de5b1617e41c3956f92a45a3342508f17f4840ab1dd3ee335ff1451df25473a2ffcc3811accba8b594d83facdc1087b21

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Darpeiwtweqqp.tmp

            Filesize

            3.5MB

            MD5

            8e85e0e49e7e2dddb089c333fda2feb1

            SHA1

            dd523d995b45ac1bfffa82d848e1b1e6e63a8698

            SHA256

            e41b9319c5851bc28a61c6b35f7259399908340d917b21ff147ab75136f2050b

            SHA512

            97f75ae09e2b98bec4e404635cbe2608e0715da9be4666212057f41088a4a3f6ac7ae7b3f1d30f1c851688dd7f94a09ae20708311807e5cbc9bb669b494ab6f9

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\GRINTL32.REST.trx_dll

            Filesize

            246KB

            MD5

            217bc8ece4bb7d1bafb5ee543b6c5378

            SHA1

            cbe0430669b5eefca33de96bd6c909b798efa7ef

            SHA256

            6f6f870bcbb6b7826b0b609e380e57e50fa034cd3eb7ecd38c638707f7cdce7f

            SHA512

            f677cef785498f7a648ccfb431aea59898a066b866417373d35f106aa70cb47de91e6dbe5a9f4cbc84978665971e873709277cbe7f3ce2d622b58ca0f0c35c37

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Help_MKWD_BestBet.H1W

            Filesize

            409KB

            MD5

            66ffecf3746c53e12a2d52c444f665a4

            SHA1

            710d0ddead253b19efc74e69e54f38d2aa476292

            SHA256

            7f8a19f7d559c5c20e78814aa95f76d809aa3f17ed06370864eded9de195471e

            SHA512

            40bc63c1af3c43469a3e7cda28ed94075698c1aa573ba0a8b8d6d27618e791e30bf48cfb38ed7657a78746716b6ee7edd7850675c6657be02aee9e284728b1a5

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Help_MValidator.H1D

            Filesize

            14KB

            MD5

            f9dbc44589bc8fdc6a28ee520581a00d

            SHA1

            394237a85bdff84682ee17048a5cd67fb1c63ec5

            SHA256

            f7762966d5e984a9da4556960417f2197bdf951dffa670c819feacef86d49395

            SHA512

            17bf442dd79f0a405850b09505b935b6a81a8e6042169bace3606bff3d30a80df3cd65621141294798202ade8a05908a4e3e95512074c1a84c1efc8fa12b2004

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\PUB6INTL.DLL.trx_dll

            Filesize

            104KB

            MD5

            741a72f0c22e931572eba1e5fbec990b

            SHA1

            6e9b6c2aa9c45f2153aa302c8acbd06fcda288cf

            SHA256

            ea54c8150cd1d305a2a608f380c7a334afda691fe89975f332324e5a09438e15

            SHA512

            32353a39864ee1a98b9291633f626522dd943ffcc03f7ee3da4f9d87bcda787ac72e2051e6b22d8cfcd063dce3e66e1f73025a4e4f93cbf96ef20a953fd14f5f

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\guest.bmp

            Filesize

            48KB

            MD5

            b0de08b6aada24cdd3458113d175f1a7

            SHA1

            225797b52f320b3efb2643c55fe55ab3a5618ae9

            SHA256

            40015814487b93a8372f33284d45586739a4a1e9d2b7961ab8c6d4d9561d10cb

            SHA512

            fd59488e0223f49d66bb3ca7a70e74b7ca2052769f78790aee0682e0306f6e9421d28ab9a34487bd8934571cccb6798c98040b25934dfe1f0a13c7ca490ecbe2

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\scan_.ico

            Filesize

            59KB

            MD5

            a161b3f9fd62c3931fbd79512810cffa

            SHA1

            a63f1d8945b983356b66819b3aa5b0bd409995e4

            SHA256

            d3ba9eecc5e87b384242385078846cff82051194887ce2d7343bb7b60e7a26d7

            SHA512

            f07776d386a39b20e3721b7450248e458ecd6f477197028aa42e2ab6a2731a002170a5415fb02fadac40b1b97acee3b5064ff76606ba2bcc14f7e7b674524299

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\tasks.xml

            Filesize

            13KB

            MD5

            4fa5493a54ed29698eab7e917c64dae2

            SHA1

            9bf7efebd63653db3b945d47011d0465d4857238

            SHA256

            86c05252eacc2b5dece4baf094526c4351e97012c621807136931ff3a3cee355

            SHA512

            7f88322ac64a352ec0c047d185359550193c32c2380e420a909ad30fa0f550469385b37428063567adc0424d884f6329dfd0e7758db9f0556bfa28d8a3824bc1

          • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\usertile24.bmp

            Filesize

            48KB

            MD5

            35cbde129d22ad6080dc8fed0fd3e185

            SHA1

            e29871c61fe34d7159cf12daa543e1679f3ef63a

            SHA256

            eaed558d6439df7f6172277ad993c778b631aa73ffce8cd9619b525ff92a2265

            SHA512

            009e3a9714454ae0b0ea87d391dd42583a390ce74d249a0421318dfa8af27e98d4cfc625f1923304a177a6824210c687f522082783c9920beeba3ab078ae2f60

          • C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp

            Filesize

            792KB

            MD5

            9e3ff54c77c7d43bfdf8cff1d31c3c51

            SHA1

            9681f127f0300093ac15d8a3fc16c289f0b9c045

            SHA256

            2c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d

            SHA512

            d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec

          • \??\c:\program files (x86)\windows mail\ja-jp\readoutloud.dll

            Filesize

            792KB

            MD5

            22f1b4d70d2a0e17c0bbdf3b38b2edb6

            SHA1

            a0953e9a776bf8a0353c9115afa362b82c134592

            SHA256

            f5b7793d2c34bb418f805214cdb1b6ef30a27b8ea8850167f9ac895e04bb0901

            SHA512

            adb7ad7ba30acf1633a3b3ae409b7573b5eb8cc2d998df9c6d46336ff0f25896233624ef47bab153c2484f5a5c039f6d5a58371e9e1eb2b27328bad4459c632c

          • \Program Files (x86)\Windows Mail\ja-JP\ReadOutLoud.dll

            Filesize

            792KB

            MD5

            22f1b4d70d2a0e17c0bbdf3b38b2edb6

            SHA1

            a0953e9a776bf8a0353c9115afa362b82c134592

            SHA256

            f5b7793d2c34bb418f805214cdb1b6ef30a27b8ea8850167f9ac895e04bb0901

            SHA512

            adb7ad7ba30acf1633a3b3ae409b7573b5eb8cc2d998df9c6d46336ff0f25896233624ef47bab153c2484f5a5c039f6d5a58371e9e1eb2b27328bad4459c632c

          • \Program Files (x86)\Windows Mail\ja-JP\ReadOutLoud.dll

            Filesize

            792KB

            MD5

            22f1b4d70d2a0e17c0bbdf3b38b2edb6

            SHA1

            a0953e9a776bf8a0353c9115afa362b82c134592

            SHA256

            f5b7793d2c34bb418f805214cdb1b6ef30a27b8ea8850167f9ac895e04bb0901

            SHA512

            adb7ad7ba30acf1633a3b3ae409b7573b5eb8cc2d998df9c6d46336ff0f25896233624ef47bab153c2484f5a5c039f6d5a58371e9e1eb2b27328bad4459c632c

          • \Program Files (x86)\Windows Mail\ja-JP\ReadOutLoud.dll

            Filesize

            792KB

            MD5

            22f1b4d70d2a0e17c0bbdf3b38b2edb6

            SHA1

            a0953e9a776bf8a0353c9115afa362b82c134592

            SHA256

            f5b7793d2c34bb418f805214cdb1b6ef30a27b8ea8850167f9ac895e04bb0901

            SHA512

            adb7ad7ba30acf1633a3b3ae409b7573b5eb8cc2d998df9c6d46336ff0f25896233624ef47bab153c2484f5a5c039f6d5a58371e9e1eb2b27328bad4459c632c

          • \Program Files (x86)\Windows Mail\ja-JP\ReadOutLoud.dll

            Filesize

            792KB

            MD5

            22f1b4d70d2a0e17c0bbdf3b38b2edb6

            SHA1

            a0953e9a776bf8a0353c9115afa362b82c134592

            SHA256

            f5b7793d2c34bb418f805214cdb1b6ef30a27b8ea8850167f9ac895e04bb0901

            SHA512

            adb7ad7ba30acf1633a3b3ae409b7573b5eb8cc2d998df9c6d46336ff0f25896233624ef47bab153c2484f5a5c039f6d5a58371e9e1eb2b27328bad4459c632c

          • \Program Files (x86)\Windows Mail\ja-JP\ReadOutLoud.dll

            Filesize

            792KB

            MD5

            22f1b4d70d2a0e17c0bbdf3b38b2edb6

            SHA1

            a0953e9a776bf8a0353c9115afa362b82c134592

            SHA256

            f5b7793d2c34bb418f805214cdb1b6ef30a27b8ea8850167f9ac895e04bb0901

            SHA512

            adb7ad7ba30acf1633a3b3ae409b7573b5eb8cc2d998df9c6d46336ff0f25896233624ef47bab153c2484f5a5c039f6d5a58371e9e1eb2b27328bad4459c632c

          • \Program Files\Mozilla Firefox\firefox.exe

            Filesize

            562KB

            MD5

            d388df6ed5ccbf1acdeda5af2d18cb0b

            SHA1

            124d3c2ba93644ac6c2d7253de242b46be836692

            SHA256

            8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

            SHA512

            f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

          • \Program Files\Mozilla Firefox\firefox.exe

            Filesize

            562KB

            MD5

            d388df6ed5ccbf1acdeda5af2d18cb0b

            SHA1

            124d3c2ba93644ac6c2d7253de242b46be836692

            SHA256

            8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

            SHA512

            f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

          • \Users\Admin\AppData\Local\Temp\Dfuqft.tmp

            Filesize

            792KB

            MD5

            9e3ff54c77c7d43bfdf8cff1d31c3c51

            SHA1

            9681f127f0300093ac15d8a3fc16c289f0b9c045

            SHA256

            2c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d

            SHA512

            d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec

          • memory/812-55-0x0000000075131000-0x0000000075133000-memory.dmp

            Filesize

            8KB

          • memory/812-57-0x0000000001DB0000-0x0000000001E9C000-memory.dmp

            Filesize

            944KB

          • memory/812-59-0x0000000001FB0000-0x00000000020E2000-memory.dmp

            Filesize

            1.2MB

          • memory/812-60-0x0000000000400000-0x000000000053A000-memory.dmp

            Filesize

            1.2MB

          • memory/812-54-0x0000000001DB0000-0x0000000001E9C000-memory.dmp

            Filesize

            944KB

          • memory/908-68-0x0000000004380000-0x00000000044C0000-memory.dmp

            Filesize

            1.2MB

          • memory/908-72-0x00000000055B0000-0x00000000056F0000-memory.dmp

            Filesize

            1.2MB

          • memory/908-73-0x0000000004380000-0x00000000044C0000-memory.dmp

            Filesize

            1.2MB

          • memory/908-74-0x0000000004380000-0x00000000044C0000-memory.dmp

            Filesize

            1.2MB

          • memory/908-69-0x00000000055B0000-0x00000000056F0000-memory.dmp

            Filesize

            1.2MB

          • memory/908-66-0x00000000049E0000-0x0000000005537000-memory.dmp

            Filesize

            11.3MB

          • memory/908-65-0x00000000049E0000-0x0000000005537000-memory.dmp

            Filesize

            11.3MB

          • memory/908-63-0x00000000049E0000-0x0000000005537000-memory.dmp

            Filesize

            11.3MB

          • memory/908-81-0x00000000049E0000-0x0000000005537000-memory.dmp

            Filesize

            11.3MB

          • memory/908-67-0x0000000004380000-0x00000000044C0000-memory.dmp

            Filesize

            1.2MB

          • memory/1220-80-0x0000000001EF0000-0x00000000021AF000-memory.dmp

            Filesize

            2.7MB

          • memory/1220-76-0x00000000022F0000-0x0000000002430000-memory.dmp

            Filesize

            1.2MB

          • memory/1220-77-0x00000000022F0000-0x0000000002430000-memory.dmp

            Filesize

            1.2MB

          • memory/1220-78-0x000007FEFB6B1000-0x000007FEFB6B3000-memory.dmp

            Filesize

            8KB

          • memory/1220-70-0x0000000000170000-0x000000000041E000-memory.dmp

            Filesize

            2.7MB

          • memory/1220-79-0x0000000000170000-0x000000000041E000-memory.dmp

            Filesize

            2.7MB

          • memory/1640-89-0x0000000004260000-0x0000000004DB7000-memory.dmp

            Filesize

            11.3MB

          • memory/1640-88-0x0000000004260000-0x0000000004DB7000-memory.dmp

            Filesize

            11.3MB

          • memory/1640-86-0x0000000004260000-0x0000000004DB7000-memory.dmp

            Filesize

            11.3MB

          • memory/1988-109-0x00000000041C0000-0x0000000004D17000-memory.dmp

            Filesize

            11.3MB

          • memory/1988-110-0x00000000041C0000-0x0000000004D17000-memory.dmp

            Filesize

            11.3MB

          • memory/1988-106-0x00000000041C0000-0x0000000004D17000-memory.dmp

            Filesize

            11.3MB

          • memory/1988-108-0x00000000041C0000-0x0000000004D17000-memory.dmp

            Filesize

            11.3MB