Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2022, 10:20

General

  • Target

    88dde4d981cff40f7df3f21b095e8714ae6805e34db8fcc5e4de3e6ed3348970.exe

  • Size

    1022KB

  • MD5

    8e1fa9f186fde8e12741505d3a4bc629

  • SHA1

    230996e3245dfa7a3352a1003defee1f096bf889

  • SHA256

    88dde4d981cff40f7df3f21b095e8714ae6805e34db8fcc5e4de3e6ed3348970

  • SHA512

    42762e72cdd4e694468166df618d82a9cc7212382b7718291142b3d6dc394faceb881287a7a0fe0aeeeb6972f611f47a627eee7b938df2086838ede740a9b423

  • SSDEEP

    24576:qYwPrOk3w1f0CxRWo+hQcGv9t4Cke4QZAzFoV6Ui:7wPrOGwF0cgojHvD4c4QZSW

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88dde4d981cff40f7df3f21b095e8714ae6805e34db8fcc5e4de3e6ed3348970.exe
    "C:\Users\Admin\AppData\Local\Temp\88dde4d981cff40f7df3f21b095e8714ae6805e34db8fcc5e4de3e6ed3348970.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp",Dioeeedresq
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4760
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14005
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1984
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:3684
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:3472
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 528
          2⤵
          • Program crash
          PID:4632
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2148 -ip 2148
        1⤵
          PID:4720
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:2196
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k LocalService
            1⤵
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\google\temp\stop_collection_data.dll",ZlEVRG01dW4=
              2⤵
              • Loads dropped DLL
              • Checks processor information in registry
              PID:4364

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\Google\Temp\stop_collection_data.dll

                  Filesize

                  792KB

                  MD5

                  4fb5757d0091022735221f9e0db262d8

                  SHA1

                  6ba9817d50b0e3066728aa054a3d28d8df257e13

                  SHA256

                  d0395f67702ee218dd060094f36d3b5566115314023ec952fa506572fbbb3e96

                  SHA512

                  2cf7b9e45509a25d38bda4ecc9ee224f4f23b2e3ee5919ac8923b982012f7a0e236494730cc7d397762d6686f8722e9fe0dc8c9fcadd6768645352b2a9c8d486

                • C:\Program Files (x86)\Google\Temp\stop_collection_data.dll

                  Filesize

                  792KB

                  MD5

                  4fb5757d0091022735221f9e0db262d8

                  SHA1

                  6ba9817d50b0e3066728aa054a3d28d8df257e13

                  SHA256

                  d0395f67702ee218dd060094f36d3b5566115314023ec952fa506572fbbb3e96

                  SHA512

                  2cf7b9e45509a25d38bda4ecc9ee224f4f23b2e3ee5919ac8923b982012f7a0e236494730cc7d397762d6686f8722e9fe0dc8c9fcadd6768645352b2a9c8d486

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\C2RManifest.osmuxmui.msi.16.en-us.xml

                  Filesize

                  10KB

                  MD5

                  220ae72aa2505c9276da2056b7e34936

                  SHA1

                  6dfb0f4fd5c0d25062d3d1235fc20358560fdb89

                  SHA256

                  afc37ba57fac36ba151953b67619dbbb985f58122f4ebe07f15b312b5bdf004c

                  SHA512

                  cab8485458b9870015f037fc6c8279018bf212d36ba01181bdb90970473a4b5aaeb9708e36eb21c8e6c1301dbdca630b29c8b3a6fa82fa14fb04bc65d235debd

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\DeploymentConfig.2.xml

                  Filesize

                  1KB

                  MD5

                  3793544370ec1fddcf5ba6ae099f2538

                  SHA1

                  c784c5d8d1c496ab7ba1150782d20cba67b76321

                  SHA256

                  87975551187040cc2505a12ac285c042b8e70921a55808ecf982c7cd37df0ae2

                  SHA512

                  debdde56e6e087ff04863490223229d37828e348f7630d6c33aae1f113cce4be75f1420c593268ef5f5bd3026dccb062015781ba83dcaffa2b9bb37b55efc319

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\Ieohspdwyru.tmp

                  Filesize

                  3.5MB

                  MD5

                  1e9a5efecd8ad1d41b4f58046f71d3d5

                  SHA1

                  10d41172bb9d9879fc33e5f0d9beb47636dcf289

                  SHA256

                  3bc250c43a9e76b8e909f70606cd24ecfeb1780987408338c3a366cd268f8be5

                  SHA512

                  0fdef9e5e107bff5233d79300623230a3810acbaad904756ab6966c47c2970c36596c26933eea6de39ec1f952d70dbc12da42702ec5bcdf006b6609f1c0fd685

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\Microsoft.BingWeather_4.25.20211.0_neutral_~_8wekyb3d8bbwe.xml

                  Filesize

                  29KB

                  MD5

                  0edf0ff4a8a9986d080992dd07e8a177

                  SHA1

                  bd58bb41baf5418a8ffaa8f75fb8fe412cf012a8

                  SHA256

                  7117f778c590d79b5a434edaa09448f23332d1db26676db2c9463b0d2c2ddfb6

                  SHA512

                  faa4c4fe982301ba2f5f2e239889c964bdb9f70b3939516e480987067a2b6482f6803bc06a514e6aac407be1306534b216dc2a801027722e985d1a2f41c01704

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\Microsoft.Office.OneNote_16001.12026.20112.0_neutral_~_8wekyb3d8bbwe.xml

                  Filesize

                  26KB

                  MD5

                  26b4cb86e7313855e188214dfee0abe4

                  SHA1

                  c4488e4c3c91bb6bd49cc3e68d9fce83c59f8422

                  SHA256

                  d182821a1030c629318d6e379cba49ac00db7a2b6aab70a3d245f7418ef490bc

                  SHA512

                  78dd7247c0fd372bc146562f46dd453aaa9fc3e4a49fb669240f76bd90249534bf6ca660058bf854eb4c05170a2e2ddabc0813223b61f09f0673fb3939f6f2b1

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\MicrosoftEdgeUpdate.log

                  Filesize

                  90KB

                  MD5

                  4a3dfa97bca6afab1b03b3338e1080fb

                  SHA1

                  3ec3a3d5eaa9c184ecd8b5ecc206e67c5ecb77b8

                  SHA256

                  4a34ab4c457ba5652c5b2f99ae5b35ed830c1cb35082f2cd48fcfd9ec5d5cf93

                  SHA512

                  df80dc86c5ea63dc1ae448d6a8d6933b835243ed014c46a21f676b072bbe73d6f4f5ff3d3d5edbdb8b04d27473a2bbb110d6be43c2f2e6c7e5e339a838e0a8ee

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\osver.txt

                  Filesize

                  10B

                  MD5

                  bea59a2f25178d677087edde21c60be7

                  SHA1

                  56844a00adee7f8d2c161808de19ce6fd191fb61

                  SHA256

                  4906553c99e9225413bacd029603f2549fe8d972bf389770063f3e932b623d80

                  SHA512

                  008622e6bf66c3cc4bdfc9cda7dc10376e310b560321ee0d7040f7c6da7673cd04799ee04b9e22bb45de378fa0791dc0b6bbf43efed1366d0520c26d803d7400

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\resource.xml

                  Filesize

                  1KB

                  MD5

                  9e3d2d6830eba41e31e8558da30ddccd

                  SHA1

                  f5fbe0dfef87a30a9898cd6e1e7691c7dd9a9b99

                  SHA256

                  50ce5d2f9497955246143e7bb7d7584f221c15574a910c7cc11af87537711d25

                  SHA512

                  d1f3774e8c2bdfb6acbb8b9429f59fce5048b5adc4ddc7ecacf7bf52862715db35aee04884a24a8e329e8d10aa5fd06cac5360aad9dd296582453fadadf4d7ee

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\superbar.png

                  Filesize

                  38KB

                  MD5

                  45b3b7ada6575d1623bd52d029d7cf96

                  SHA1

                  ae4810a660e18d7e40594d1e8e0fe33b46a7f2a4

                  SHA256

                  0f35ace5268db33940ed18e946a9c65be4e31ec0ae31faa6e60122859c5cb5ca

                  SHA512

                  c7d39db201687940bcbf8e3afb90becf5389640d7948e0cf3518bfae98fda1496650fa59a490631fcad894a9aa0f3d78e4d8b5bb9df57812abbc010c638926a8

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\tasks.xml

                  Filesize

                  10KB

                  MD5

                  c949974e2fc5c8909c2efafb92f7640d

                  SHA1

                  ec68489a4a4fa022e5b60901f7221d733365a9c9

                  SHA256

                  1131721b6f906cedebbcefe223725ae0f5c7ad0a96219eabaa49dc8d38cedf40

                  SHA512

                  8fc8e3cdcb66ec98962d0f888f0abe90e1a18db09144e00494dda9f56eaf7ed623e0ee13efd8a29fbf72c7094bbc9f489baf2d54e8170bb4b04d5363ec354362

                • C:\ProgramData\{0222BCDE-1250-CD5F-F334-C7FEF4A3D675}\utc.tracing.json.bk

                  Filesize

                  28B

                  MD5

                  6c7e84cb1a40e1e6a5cfe37e2ceaad04

                  SHA1

                  a2781444bb3c55196292df729b01be707ec1953a

                  SHA256

                  c6bf69533d3fc2c00d2e601726411163cae0e6cb168662eb6a58b492a25b042c

                  SHA512

                  97c9bc007beda6e6ea9c9aeea3f4033fe77304d5417a9f9f97ede9ed168f7259053f5861227a3a7eaa4859d1d1a7898705b0f8aae9527b4b607ab205e3b6e9aa

                • C:\Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp

                  Filesize

                  792KB

                  MD5

                  822d3ead416a1a85cb96e65f65cd5ae2

                  SHA1

                  af32b69e2835d1cacdadb97ae6dfafccc32d1837

                  SHA256

                  72bdb3a06dca8458ac9aedf06785b2d7b95a19f8b9f3f8f5be2eb4744e9c5d1d

                  SHA512

                  48d0d61efd51fd2d8eb04d990b4a5b3ca34c916199d3b0a3b135d2089e028ee37f5145e4705fb75da77eaabbe12f8c4ea55775a41e1b1c68a90ce68b8c2a7260

                • C:\Users\Admin\AppData\Local\Temp\Qfyshwqueqdpai.tmp

                  Filesize

                  792KB

                  MD5

                  822d3ead416a1a85cb96e65f65cd5ae2

                  SHA1

                  af32b69e2835d1cacdadb97ae6dfafccc32d1837

                  SHA256

                  72bdb3a06dca8458ac9aedf06785b2d7b95a19f8b9f3f8f5be2eb4744e9c5d1d

                  SHA512

                  48d0d61efd51fd2d8eb04d990b4a5b3ca34c916199d3b0a3b135d2089e028ee37f5145e4705fb75da77eaabbe12f8c4ea55775a41e1b1c68a90ce68b8c2a7260

                • \??\c:\program files (x86)\google\temp\stop_collection_data.dll

                  Filesize

                  792KB

                  MD5

                  4fb5757d0091022735221f9e0db262d8

                  SHA1

                  6ba9817d50b0e3066728aa054a3d28d8df257e13

                  SHA256

                  d0395f67702ee218dd060094f36d3b5566115314023ec952fa506572fbbb3e96

                  SHA512

                  2cf7b9e45509a25d38bda4ecc9ee224f4f23b2e3ee5919ac8923b982012f7a0e236494730cc7d397762d6686f8722e9fe0dc8c9fcadd6768645352b2a9c8d486

                • memory/1984-147-0x0000019058520000-0x0000019058660000-memory.dmp

                  Filesize

                  1.2MB

                • memory/1984-149-0x0000019058520000-0x0000019058660000-memory.dmp

                  Filesize

                  1.2MB

                • memory/1984-151-0x0000019056AD0000-0x0000019056D7E000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1984-150-0x00000000007E0000-0x0000000000A7C000-memory.dmp

                  Filesize

                  2.6MB

                • memory/1984-152-0x0000019056AD0000-0x0000019056D7E000-memory.dmp

                  Filesize

                  2.7MB

                • memory/2148-132-0x00000000021EF000-0x00000000022C5000-memory.dmp

                  Filesize

                  856KB

                • memory/2148-135-0x0000000000400000-0x0000000000524000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2148-134-0x0000000002380000-0x0000000002491000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2804-175-0x00000000046F0000-0x000000000524D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/2804-157-0x00000000046F0000-0x000000000524D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/2804-158-0x00000000046F0000-0x000000000524D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4364-172-0x00000000048E0000-0x000000000543D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4364-171-0x00000000048E0000-0x000000000543D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4760-148-0x00000000049D9000-0x00000000049DB000-memory.dmp

                  Filesize

                  8KB

                • memory/4760-143-0x0000000004960000-0x0000000004AA0000-memory.dmp

                  Filesize

                  1.2MB

                • memory/4760-142-0x0000000004960000-0x0000000004AA0000-memory.dmp

                  Filesize

                  1.2MB

                • memory/4760-141-0x0000000004960000-0x0000000004AA0000-memory.dmp

                  Filesize

                  1.2MB

                • memory/4760-145-0x0000000004960000-0x0000000004AA0000-memory.dmp

                  Filesize

                  1.2MB

                • memory/4760-138-0x0000000004FC0000-0x0000000005B1D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4760-144-0x0000000004960000-0x0000000004AA0000-memory.dmp

                  Filesize

                  1.2MB

                • memory/4760-139-0x0000000004FC0000-0x0000000005B1D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4760-153-0x0000000004FC0000-0x0000000005B1D000-memory.dmp

                  Filesize

                  11.4MB

                • memory/4760-140-0x0000000004960000-0x0000000004AA0000-memory.dmp

                  Filesize

                  1.2MB