Analysis

  • max time kernel
    127s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2023, 20:27

General

  • Target

    42175739beca9ccb6506dad8acec5ac1.exe

  • Size

    1.1MB

  • MD5

    42175739beca9ccb6506dad8acec5ac1

  • SHA1

    6b3c387289b36008d27c2d4e1254fa590129fcdb

  • SHA256

    13b5294a05516f2e597a4e671dc3656a315115b71b58c62b6626cc8b0a0a705e

  • SHA512

    1f8d8d0d31870c8b0a1926bb3ce8ddb7b520928abd2ff815762b6be372e61c31295d77db9857b48ec3fa9f9a13df8d6fc6891b8a078fe7f17a989e20cde417f3

  • SSDEEP

    24576:o7btwMlf5ERIOUMhBPEL3uQw/MmUGnuXIznKcwmTbNq:o7qMTECWETNWNTbNq

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 43 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42175739beca9ccb6506dad8acec5ac1.exe
    "C:\Users\Admin\AppData\Local\Temp\42175739beca9ccb6506dad8acec5ac1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Wtfoiq.tmp",Iyidwoiowsw
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1372
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 15606
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1148
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:320
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k LocalService
      1⤵
      • Loads dropped DLL
      • Checks processor information in registry
      PID:276
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windows nt\tabletextservice\search.dll",OBEn
        2⤵
          PID:1932

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\{B7E8E476-349D-60AA-651B-798B40E3CAEC}\Help_MKWD_AssetId.H1W

              Filesize

              229KB

              MD5

              9d71aad3e98a2a4f649b915e0f06c615

              SHA1

              1bb08be79763d3a86933aa7ae0be123076a9e9f4

              SHA256

              9b4ed822f94ae21187952c651e319dbcc5121e80381bae5d379b0de6326fa238

              SHA512

              8e42c83a7895fdf4a37507f144e084ba4042708585e531b3f94f91a977ef1df95bfc9634472092605ea96ffafa6c132069f1796edcfdb533fd043dbe146d238d

            • C:\ProgramData\{B7E8E476-349D-60AA-651B-798B40E3CAEC}\Help_MKWD_BestBet.H1W

              Filesize

              421KB

              MD5

              ad85f77d873f520b0e2947c562913f01

              SHA1

              242153d292bde366ffe66b26c8d2d5cb557d19e2

              SHA256

              a0aa02d0f4b3ad8e7054e2f11fc58d4eace829b9eb42ef7718ac5cbde486126c

              SHA512

              82a5fa146a0ce4a7ce435778cc76f776bab78d90049f40c1ca20e5af0075f9aa3d8732a751daa074654df2d617c5ffe4df6896db57124878f5bb54ac45c7f3a0

            • C:\ProgramData\{B7E8E476-349D-60AA-651B-798B40E3CAEC}\MSOINTL.DLL.trx_dll

              Filesize

              91KB

              MD5

              6d5fd45ebd9f85a85ae0fa2f6e3a614a

              SHA1

              39537d0d8751afb08f67edf03fce0cdf1f878208

              SHA256

              1b8a8cffb939985bde53a0ba784a8c37a209fbd7356f6a841c266490e5574bf3

              SHA512

              326615d80047262935573796a9d9ccf0abb4b7c017280e14466ebc5a80a931430e40978bbc56d5495e9fe484b241a924661b5dcaec3326d58c45d28aed00668b

            • C:\ProgramData\{B7E8E476-349D-60AA-651B-798B40E3CAEC}\MySharePoints.ico

              Filesize

              340KB

              MD5

              1f24dae5e9da4d6e021683d7d03fb528

              SHA1

              c986d8e34f84c7b2e931a7ff61eb307ef8789f0d

              SHA256

              241b42c7911a7c36ae89c45366397384f91145fe39308352f0242c357505e06b

              SHA512

              b1e6e9d4e2ff4cd1b452de1ae14b40e436cc82f22251cbc87788742145000d650b522544bba9085ba36f5cab43d9e4481a7b8ef46acb280da6bd83ab0441b58d

            • C:\ProgramData\{B7E8E476-349D-60AA-651B-798B40E3CAEC}\Rwdfud.tmp

              Filesize

              3.5MB

              MD5

              1c9deae86d194a10c0960364d2ba67a9

              SHA1

              abccaeea5f831f29b833b7514bf3a7b8e9c4253f

              SHA256

              b429dfc028dc0193837ca20cdb4fefafa2a18a980d020c1d92d0dcc5d14a759a

              SHA512

              16906be8d30feb59f004fa203a5799cbb0a327ad8cdce33dd767b00ae8d51bf6b400d5c5a7356577247bced5ef846f0853345cbc791ecbccf347792dec1a075a

            • C:\ProgramData\{B7E8E476-349D-60AA-651B-798B40E3CAEC}\usertile18.bmp

              Filesize

              48KB

              MD5

              1ef0b094eb051cfc99e3dfa991c669c5

              SHA1

              2534e234cbed0ccd69f53208069686ec5c617ccb

              SHA256

              2e6c724b2aae160291a7df88d394514535171833eba1dd20204f9d5788f0f878

              SHA512

              13d11abccfef086046efa0957156189235bb2df8186ea143278ba557039b285beb55d990096456ad9d67ba700fe8644dd1ffa75d2c64b2a36ee2a9a8d6978342

            • C:\ProgramData\{B7E8E476-349D-60AA-651B-798B40E3CAEC}\watermark.png

              Filesize

              28KB

              MD5

              1f93b502e78190a2f496c2d9558e069d

              SHA1

              6ae6249493d36682270c0d5e3eb3c472fdd2766e

              SHA256

              5c5b0de42d55486ed61dd3a6e96ab09f467bb38ae39fced97adc51ba07426c0e

              SHA512

              cf07724c203a82c9f202d53f63ea00ab0df2f97484bd3b9abe1a001f2e531f505ddd4ff8f2d5a2769dd9d2d60e9c1d03dd3ab5143542688f944cfd35c6f1cdf3

            • C:\Users\Admin\AppData\Local\Temp\Wtfoiq.tmp

              Filesize

              714KB

              MD5

              9dd70d24b2657a9254b9fd536a4d06d5

              SHA1

              348a1d210d7c4daef8ecdb692eadf3975971e8ee

              SHA256

              d0ac0e9021c6e231c60256198309b7f72ce4c5e772cf343b5456c2ce0664b9bd

              SHA512

              dee5bfe83fdf196c78ee255e50a25994220ce9ecac22eb24323df70e668714d7a810b67ddace7809d9d7e2160a35c4603deedb64b1660d82dde58586c34d2ab6

            • \??\c:\program files (x86)\windows nt\tabletextservice\search.dll

              Filesize

              714KB

              MD5

              ac3a499e2923dc82ebd410ca06f1c585

              SHA1

              71597d35731278962768696b33d3147a801fc5f9

              SHA256

              a33df873b661dd78c97e907e02589174308f83d445ec1f359822d66a4940fa23

              SHA512

              ddccbfafdb15aa5a160d7c0c6c4d234f1848c627ffa302971e77c7a49cc30ef15cd43323d008fe97a3127726d5eef35d9884ec536726e6c4cc5b394247f21245

            • \Program Files (x86)\Windows NT\TableTextService\Search.dll

              Filesize

              714KB

              MD5

              ac3a499e2923dc82ebd410ca06f1c585

              SHA1

              71597d35731278962768696b33d3147a801fc5f9

              SHA256

              a33df873b661dd78c97e907e02589174308f83d445ec1f359822d66a4940fa23

              SHA512

              ddccbfafdb15aa5a160d7c0c6c4d234f1848c627ffa302971e77c7a49cc30ef15cd43323d008fe97a3127726d5eef35d9884ec536726e6c4cc5b394247f21245

            • \Program Files (x86)\Windows NT\TableTextService\Search.dll

              Filesize

              714KB

              MD5

              ac3a499e2923dc82ebd410ca06f1c585

              SHA1

              71597d35731278962768696b33d3147a801fc5f9

              SHA256

              a33df873b661dd78c97e907e02589174308f83d445ec1f359822d66a4940fa23

              SHA512

              ddccbfafdb15aa5a160d7c0c6c4d234f1848c627ffa302971e77c7a49cc30ef15cd43323d008fe97a3127726d5eef35d9884ec536726e6c4cc5b394247f21245

            • \Program Files (x86)\Windows NT\TableTextService\Search.dll

              Filesize

              714KB

              MD5

              ac3a499e2923dc82ebd410ca06f1c585

              SHA1

              71597d35731278962768696b33d3147a801fc5f9

              SHA256

              a33df873b661dd78c97e907e02589174308f83d445ec1f359822d66a4940fa23

              SHA512

              ddccbfafdb15aa5a160d7c0c6c4d234f1848c627ffa302971e77c7a49cc30ef15cd43323d008fe97a3127726d5eef35d9884ec536726e6c4cc5b394247f21245

            • \Program Files (x86)\Windows NT\TableTextService\Search.dll

              Filesize

              714KB

              MD5

              ac3a499e2923dc82ebd410ca06f1c585

              SHA1

              71597d35731278962768696b33d3147a801fc5f9

              SHA256

              a33df873b661dd78c97e907e02589174308f83d445ec1f359822d66a4940fa23

              SHA512

              ddccbfafdb15aa5a160d7c0c6c4d234f1848c627ffa302971e77c7a49cc30ef15cd43323d008fe97a3127726d5eef35d9884ec536726e6c4cc5b394247f21245

            • \Program Files (x86)\Windows NT\TableTextService\Search.dll

              Filesize

              714KB

              MD5

              ac3a499e2923dc82ebd410ca06f1c585

              SHA1

              71597d35731278962768696b33d3147a801fc5f9

              SHA256

              a33df873b661dd78c97e907e02589174308f83d445ec1f359822d66a4940fa23

              SHA512

              ddccbfafdb15aa5a160d7c0c6c4d234f1848c627ffa302971e77c7a49cc30ef15cd43323d008fe97a3127726d5eef35d9884ec536726e6c4cc5b394247f21245

            • \Program Files\Mozilla Firefox\firefox.exe

              Filesize

              562KB

              MD5

              d388df6ed5ccbf1acdeda5af2d18cb0b

              SHA1

              124d3c2ba93644ac6c2d7253de242b46be836692

              SHA256

              8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

              SHA512

              f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

            • \Program Files\Mozilla Firefox\firefox.exe

              Filesize

              562KB

              MD5

              d388df6ed5ccbf1acdeda5af2d18cb0b

              SHA1

              124d3c2ba93644ac6c2d7253de242b46be836692

              SHA256

              8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

              SHA512

              f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

            • \Program Files\Mozilla Firefox\firefox.exe

              Filesize

              562KB

              MD5

              d388df6ed5ccbf1acdeda5af2d18cb0b

              SHA1

              124d3c2ba93644ac6c2d7253de242b46be836692

              SHA256

              8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

              SHA512

              f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

            • \Program Files\Mozilla Firefox\firefox.exe

              Filesize

              562KB

              MD5

              d388df6ed5ccbf1acdeda5af2d18cb0b

              SHA1

              124d3c2ba93644ac6c2d7253de242b46be836692

              SHA256

              8bcfd8420d721cc0ca50c1bef653e63e013ce201dfcca5927228eb25c9abf606

              SHA512

              f45200d296f4956ec2c39115095559e7825a748b5481c1a3244edf362a49c40b90d778fcdf4bf629095661d96879c96259574d9bfc29d81b6b14f19f4c32d234

            • \Users\Admin\AppData\Local\Temp\Wtfoiq.tmp

              Filesize

              714KB

              MD5

              9dd70d24b2657a9254b9fd536a4d06d5

              SHA1

              348a1d210d7c4daef8ecdb692eadf3975971e8ee

              SHA256

              d0ac0e9021c6e231c60256198309b7f72ce4c5e772cf343b5456c2ce0664b9bd

              SHA512

              dee5bfe83fdf196c78ee255e50a25994220ce9ecac22eb24323df70e668714d7a810b67ddace7809d9d7e2160a35c4603deedb64b1660d82dde58586c34d2ab6

            • memory/276-96-0x0000000004000000-0x0000000004B41000-memory.dmp

              Filesize

              11.3MB

            • memory/276-108-0x0000000004000000-0x0000000004B41000-memory.dmp

              Filesize

              11.3MB

            • memory/276-88-0x0000000004000000-0x0000000004B41000-memory.dmp

              Filesize

              11.3MB

            • memory/276-86-0x0000000004000000-0x0000000004B41000-memory.dmp

              Filesize

              11.3MB

            • memory/840-62-0x0000000000400000-0x0000000002CFE000-memory.dmp

              Filesize

              41.0MB

            • memory/840-54-0x0000000002E90000-0x0000000002F64000-memory.dmp

              Filesize

              848KB

            • memory/840-58-0x0000000004690000-0x00000000047A5000-memory.dmp

              Filesize

              1.1MB

            • memory/840-57-0x0000000002E90000-0x0000000002F64000-memory.dmp

              Filesize

              848KB

            • memory/840-55-0x0000000075091000-0x0000000075093000-memory.dmp

              Filesize

              8KB

            • memory/1148-80-0x0000000001FF0000-0x00000000022A2000-memory.dmp

              Filesize

              2.7MB

            • memory/1148-70-0x00000000001F0000-0x0000000000491000-memory.dmp

              Filesize

              2.6MB

            • memory/1148-79-0x00000000001F0000-0x0000000000491000-memory.dmp

              Filesize

              2.6MB

            • memory/1148-78-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp

              Filesize

              8KB

            • memory/1148-76-0x0000000001E20000-0x0000000001F60000-memory.dmp

              Filesize

              1.2MB

            • memory/1148-77-0x0000000001E20000-0x0000000001F60000-memory.dmp

              Filesize

              1.2MB

            • memory/1372-68-0x0000000004F70000-0x00000000050B0000-memory.dmp

              Filesize

              1.2MB

            • memory/1372-67-0x0000000004F70000-0x00000000050B0000-memory.dmp

              Filesize

              1.2MB

            • memory/1372-72-0x0000000005F60000-0x00000000060A0000-memory.dmp

              Filesize

              1.2MB

            • memory/1372-73-0x0000000004F70000-0x00000000050B0000-memory.dmp

              Filesize

              1.2MB

            • memory/1372-81-0x0000000004420000-0x0000000004F61000-memory.dmp

              Filesize

              11.3MB

            • memory/1372-69-0x0000000005F60000-0x00000000060A0000-memory.dmp

              Filesize

              1.2MB

            • memory/1372-74-0x0000000004F70000-0x00000000050B0000-memory.dmp

              Filesize

              1.2MB

            • memory/1372-63-0x0000000004420000-0x0000000004F61000-memory.dmp

              Filesize

              11.3MB

            • memory/1372-65-0x0000000004420000-0x0000000004F61000-memory.dmp

              Filesize

              11.3MB

            • memory/1372-66-0x0000000004420000-0x0000000004F61000-memory.dmp

              Filesize

              11.3MB

            • memory/1932-104-0x0000000003F60000-0x0000000004AA1000-memory.dmp

              Filesize

              11.3MB

            • memory/1932-102-0x0000000003F60000-0x0000000004AA1000-memory.dmp

              Filesize

              11.3MB

            • memory/1932-105-0x0000000003F60000-0x0000000004AA1000-memory.dmp

              Filesize

              11.3MB