Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2023, 05:10

General

  • Target

    90d00f604f9a5531fdcb696e270b6c6ffca81e03903392a20adb6bcb4fd291eb.exe

  • Size

    1.1MB

  • MD5

    4d7b1f535d7b5681e514410b3beb1f45

  • SHA1

    b92a91cc38eec5ac51e06f2c3f0f062801066c4a

  • SHA256

    90d00f604f9a5531fdcb696e270b6c6ffca81e03903392a20adb6bcb4fd291eb

  • SHA512

    0c7401b2e54d2ed8775147edffe256e3bfc647ddedc34cdb8dbd250485aba91d304b9a3095c7a0cd30a44650ed7979094b556e886bce9fd804166ac4faa9e868

  • SSDEEP

    24576:F2g7O+em1A+9B9Bf9DNt3u6S2zirWadURMUEBoUYL:FveojdXFXzy3UReBop

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90d00f604f9a5531fdcb696e270b6c6ffca81e03903392a20adb6bcb4fd291eb.exe
    "C:\Users\Admin\AppData\Local\Temp\90d00f604f9a5531fdcb696e270b6c6ffca81e03903392a20adb6bcb4fd291eb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Pyupydeoe.tmp",Uprsprhaot
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:992
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23945
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4308
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:4996
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4488
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
            3⤵
              PID:2264
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
              3⤵
                PID:4608
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                3⤵
                  PID:5024
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                  3⤵
                    PID:2532
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 528
                  2⤵
                  • Program crash
                  PID:1528
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4708 -ip 4708
                1⤵
                  PID:4460
                • C:\Windows\System32\rundll32.exe
                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                  1⤵
                    PID:444
                  • C:\Windows\SysWOW64\svchost.exe
                    C:\Windows\SysWOW64\svchost.exe -k LocalService
                    1⤵
                    • Loads dropped DLL
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:4508
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\main-high-contrast.dll",SRU0NFF1MjY=
                      2⤵
                      • Loads dropped DLL
                      • Checks processor information in registry
                      PID:4132

                  Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files (x86)\WindowsPowerShell\Modules\main-high-contrast.dll

                          Filesize

                          784KB

                          MD5

                          9849efd173d03a102031edb2c3a1e339

                          SHA1

                          f7b7465b03ca47d3db9174887787749527b7353e

                          SHA256

                          36a79485f9ef48d262d00391a1138dcf35ad99c074dbcce0544393ae14eef91d

                          SHA512

                          7ad4ae227950bec9bfdbd5e3b58b3ac1c4d1a1c02a6b0ecfa1653421d8044add3fcd85022509fbb67626b306cac6ab645cb80b2f7e4ac24e76e29235edee766f

                        • C:\Program Files (x86)\WindowsPowerShell\Modules\main-high-contrast.dll

                          Filesize

                          784KB

                          MD5

                          9849efd173d03a102031edb2c3a1e339

                          SHA1

                          f7b7465b03ca47d3db9174887787749527b7353e

                          SHA256

                          36a79485f9ef48d262d00391a1138dcf35ad99c074dbcce0544393ae14eef91d

                          SHA512

                          7ad4ae227950bec9bfdbd5e3b58b3ac1c4d1a1c02a6b0ecfa1653421d8044add3fcd85022509fbb67626b306cac6ab645cb80b2f7e4ac24e76e29235edee766f

                        • C:\ProgramData\{E6FB8490-097E-1893-E5D7-72BBB5B030D6}\C2RManifest.PowerPivot.PowerPivot.x-none.msi.16.x-none.xml

                          Filesize

                          30KB

                          MD5

                          98de295b21abe2451f86b82df3be269a

                          SHA1

                          1665a23d307748e8c1c0164ba7939275f9fb676c

                          SHA256

                          fd3507cd60edf41093c8fe843d1601e33db9cbe1cd36247cec587c265109bcfa

                          SHA512

                          230ae283c81771496dcae9ef84787379712106738ea82754b101af9047ae27cadb8b1f4aed00d146a699c22fd1c505c31068418a70d2b535c85c3017726d91cc

                        • C:\ProgramData\{E6FB8490-097E-1893-E5D7-72BBB5B030D6}\C2RManifest.Proof.Culture.msi.16.en-us.xml

                          Filesize

                          25KB

                          MD5

                          c61439f60c39268b94a18e5d51f0b26e

                          SHA1

                          4ee213d4f4438b2fd8841bcb7ee07ca0f4742b3a

                          SHA256

                          06bc78753a1130463805f6ee03e1c2fe991e04d14e02ad852e8f857c43e24213

                          SHA512

                          88310fcea8cfa7fa1f028d4af3d529ef92cad0002705a5c720e5779cf465555917ac63042d999c575c22889b229e624f3da01525797dd262309d95461b75b45c

                        • C:\ProgramData\{E6FB8490-097E-1893-E5D7-72BBB5B030D6}\MicrosoftOffice2013Office365Win64.xml

                          Filesize

                          10KB

                          MD5

                          46353bb25b4eb2e9d26a25744c716563

                          SHA1

                          a9a9c2a1260542b5246fd642425dcc2a29a098c1

                          SHA256

                          3fae1d780e8a63d73847dc38412952c238d0e3ca01a97caee718489a3d424893

                          SHA512

                          09027ff22d03712258dbd10d6fe2cafbefd90e974210b09d20008d8eb6b569915064c65a7403187b0d78e79c96838cc0bba49b089acc7c7ab790866359719197

                        • C:\ProgramData\{E6FB8490-097E-1893-E5D7-72BBB5B030D6}\Microsoft_Office_OfficeTelemetryAgentFallBack2016.xml

                          Filesize

                          3KB

                          MD5

                          1a3168a15983b890b16390a23a89a02e

                          SHA1

                          d56ce16d88d79159a27c2d1cd3770dc56d897ebe

                          SHA256

                          334782208e9520975f597b19a273fcc6f3a8a7caffd2e4fb22213f6b957f4946

                          SHA512

                          f2be33992fd70d90eb94973c19924229bb70da4ce21c9777cfccbf56b0635452b382d2846afe2b0cc80a83d3b6a2c855557855cfb22fc681d182b2b605daa668

                        • C:\ProgramData\{E6FB8490-097E-1893-E5D7-72BBB5B030D6}\Oreqhqoupyrw.tmp

                          Filesize

                          3.5MB

                          MD5

                          2f59338c41f26d8df8f8fba4048ffef9

                          SHA1

                          27db0fe8aed2f5c4211651e853c79da84dd65d9e

                          SHA256

                          38f274119f2b14f1b341b8a74de6b5bb35df5d36ad872e272a89f3ef074e68c9

                          SHA512

                          74457168a78c2b6e74490f2e7c74b1f01c2b297c02065df4b9f46c1afc565fbdac5df7f9d664f983490d5fe01c3469598b060aaf663da08f3e0f9d87cf1e7826

                        • C:\ProgramData\{E6FB8490-097E-1893-E5D7-72BBB5B030D6}\Oreqhqoupyrw.tmp

                          Filesize

                          3.5MB

                          MD5

                          2f59338c41f26d8df8f8fba4048ffef9

                          SHA1

                          27db0fe8aed2f5c4211651e853c79da84dd65d9e

                          SHA256

                          38f274119f2b14f1b341b8a74de6b5bb35df5d36ad872e272a89f3ef074e68c9

                          SHA512

                          74457168a78c2b6e74490f2e7c74b1f01c2b297c02065df4b9f46c1afc565fbdac5df7f9d664f983490d5fe01c3469598b060aaf663da08f3e0f9d87cf1e7826

                        • C:\ProgramData\{E6FB8490-097E-1893-E5D7-72BBB5B030D6}\SmsInterceptStore.jfm

                          Filesize

                          16KB

                          MD5

                          0a3b9b8fb940095debcf0e31f234d539

                          SHA1

                          8833b5658e50e6c88ac9b0dc03f203299a1cfd26

                          SHA256

                          0f491d164d156d9e40f8ebb625c27fdcf739b44c22b3bfba49b77ae6c70ff271

                          SHA512

                          6f62d6891211181cf0140895b1b4947b2afe8bb302251c374f58984a001e1573c735b382119de27660e8acdf439336d06260faaf8aa3b0cd150452b9701ef8e1

                        • C:\Users\Admin\AppData\Local\Temp\Pyupydeoe.tmp

                          Filesize

                          784KB

                          MD5

                          c50c2f17112b6c6b0892cb2c1f502108

                          SHA1

                          3dd1444384bf790f5aa90ae95ef7745fa4cfaf72

                          SHA256

                          20dc61c5456ea5756f432aebecf74660acebf5ace0f7c8d1b360757ed79075d8

                          SHA512

                          bfbfc3a13816a12e25c373f6739215b9dff559fecfdf26c3358a452bdc833b6eaa64bbae316f4b29b9e9ce802e9f50c66b533c8c3c1b372025a7f0b7d8b452f1

                        • C:\Users\Admin\AppData\Local\Temp\Pyupydeoe.tmp

                          Filesize

                          784KB

                          MD5

                          c50c2f17112b6c6b0892cb2c1f502108

                          SHA1

                          3dd1444384bf790f5aa90ae95ef7745fa4cfaf72

                          SHA256

                          20dc61c5456ea5756f432aebecf74660acebf5ace0f7c8d1b360757ed79075d8

                          SHA512

                          bfbfc3a13816a12e25c373f6739215b9dff559fecfdf26c3358a452bdc833b6eaa64bbae316f4b29b9e9ce802e9f50c66b533c8c3c1b372025a7f0b7d8b452f1

                        • \??\c:\program files (x86)\windowspowershell\modules\main-high-contrast.dll

                          Filesize

                          784KB

                          MD5

                          9849efd173d03a102031edb2c3a1e339

                          SHA1

                          f7b7465b03ca47d3db9174887787749527b7353e

                          SHA256

                          36a79485f9ef48d262d00391a1138dcf35ad99c074dbcce0544393ae14eef91d

                          SHA512

                          7ad4ae227950bec9bfdbd5e3b58b3ac1c4d1a1c02a6b0ecfa1653421d8044add3fcd85022509fbb67626b306cac6ab645cb80b2f7e4ac24e76e29235edee766f

                        • memory/992-142-0x0000000005B10000-0x0000000005C50000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/992-140-0x0000000004E10000-0x0000000005962000-memory.dmp

                          Filesize

                          11.3MB

                        • memory/992-146-0x0000000005B10000-0x0000000005C50000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/992-147-0x0000000005B10000-0x0000000005C50000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/992-139-0x0000000004E10000-0x0000000005962000-memory.dmp

                          Filesize

                          11.3MB

                        • memory/992-143-0x0000000005B10000-0x0000000005C50000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/992-141-0x0000000005B10000-0x0000000005C50000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/992-145-0x0000000005B10000-0x0000000005C50000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/992-153-0x0000000004E10000-0x0000000005962000-memory.dmp

                          Filesize

                          11.3MB

                        • memory/4132-169-0x0000000004C90000-0x00000000057E2000-memory.dmp

                          Filesize

                          11.3MB

                        • memory/4132-170-0x0000000004C90000-0x00000000057E2000-memory.dmp

                          Filesize

                          11.3MB

                        • memory/4308-152-0x0000020244C00000-0x0000020244EAC000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/4308-150-0x0000020246650000-0x0000020246790000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/4308-149-0x0000020246650000-0x0000020246790000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/4308-151-0x0000000000920000-0x0000000000BBB000-memory.dmp

                          Filesize

                          2.6MB

                        • memory/4508-174-0x0000000003D30000-0x0000000004882000-memory.dmp

                          Filesize

                          11.3MB

                        • memory/4508-158-0x0000000003D30000-0x0000000004882000-memory.dmp

                          Filesize

                          11.3MB

                        • memory/4508-168-0x0000000003D30000-0x0000000004882000-memory.dmp

                          Filesize

                          11.3MB

                        • memory/4708-135-0x000000000315B000-0x0000000003233000-memory.dmp

                          Filesize

                          864KB

                        • memory/4708-136-0x0000000004AA0000-0x0000000004BB2000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4708-137-0x0000000000400000-0x0000000002D10000-memory.dmp

                          Filesize

                          41.1MB

                        • memory/4708-138-0x0000000000400000-0x0000000002D10000-memory.dmp

                          Filesize

                          41.1MB