Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
09-01-2023 10:20
Static task
static1
Behavioral task
behavioral1
Sample
bfc83919bff11c630a90c559ddc1deb8316453c0cd492e8f1251d9e5e262700c.exe
Resource
win10-20220901-en
General
-
Target
bfc83919bff11c630a90c559ddc1deb8316453c0cd492e8f1251d9e5e262700c.exe
-
Size
1.0MB
-
MD5
7d0ec78a9495cea56b5b5716d28f2590
-
SHA1
6367a468e35540e1480b744e99ba864e972e6c35
-
SHA256
bfc83919bff11c630a90c559ddc1deb8316453c0cd492e8f1251d9e5e262700c
-
SHA512
c94fce36d141f00b1dd807804e8099fb88d2bacc21f8f88b48d0ef7d4eeab165a9e0098d69f66515d4f20731fa01735ff19101c445d7e66358dc3163f38d84c5
-
SSDEEP
24576:pj/qbiEMYfjf2rdgvJUu9wCf3LsM/b2Axh6+PT:pj/6ffQEXwCD7/b2AxnL
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 2 3480 rundll32.exe 3 3480 rundll32.exe 11 3480 rundll32.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AdobeXMP\Parameters\ServiceDll = "C:\\Program Files (x86)\\WindowsPowerShell\\Modules\\AdobeXMP.dll" rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\AdobeXMP\ImagePath = "C:\\Windows\\system32\\svchost.exe -k LocalService\uff00" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3480 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3480 set thread context of 2224 3480 rundll32.exe 67 -
Drops file in Program Files directory 13 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\EPDF_Full.aapp rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PDFSigQFormalRep.pdf rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\AddressBook.png rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\icudt40.dll rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\AddressBook.png rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\cef_200_percent.pak rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\main-high-contrast.css rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\main-cef-mac.css rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\AdobeXMP.dll rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\icudt40.dll rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\main-cef-mac.css rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\PDFSigQFormalRep.pdf rundll32.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\EPDF_Full.aapp rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e0031000000000029569152100054656d7000003a0009000400efbe2155a884295691522e0000000000000000000000000000000000000000000000000020771a00540065006d007000000014000000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2692 wrote to memory of 3480 2692 bfc83919bff11c630a90c559ddc1deb8316453c0cd492e8f1251d9e5e262700c.exe 66 PID 2692 wrote to memory of 3480 2692 bfc83919bff11c630a90c559ddc1deb8316453c0cd492e8f1251d9e5e262700c.exe 66 PID 2692 wrote to memory of 3480 2692 bfc83919bff11c630a90c559ddc1deb8316453c0cd492e8f1251d9e5e262700c.exe 66 PID 3480 wrote to memory of 2224 3480 rundll32.exe 67 PID 3480 wrote to memory of 2224 3480 rundll32.exe 67 PID 3480 wrote to memory of 2224 3480 rundll32.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfc83919bff11c630a90c559ddc1deb8316453c0cd492e8f1251d9e5e262700c.exe"C:\Users\Admin\AppData\Local\Temp\bfc83919bff11c630a90c559ddc1deb8316453c0cd492e8f1251d9e5e262700c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Wtfoiq.tmp",Iyidwoiowsw2⤵
- Blocklisted process makes network request
- Sets DLL path for service in the registry
- Sets service image path in registry
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 155993⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2224
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:3828
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵PID:4880
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5100
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LocalService1⤵PID:2768
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\adobexmp.dll",Qgo4WWdTNkk=2⤵PID:4840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\{B7E8E476-349D-60AA-651B-798B40E3CAEC}\102__Connections_Cellular_Claro (Dominican Republic)_i1$(__MVID)@WAP.provxml
Filesize670B
MD5e138d12df07a17d5c6430f164d346e9f
SHA1737b9f72f21706882009bdc9dd4480652a424494
SHA256a291b07ef66ac7d269030117060c2a271f22590f5a9dd056ba522841663b30ed
SHA5129dde92da0b7e408369cc0d826c933a3f32dea4f9b6d76e8690e365bd3bf2e4a8b9432a0c9dc279fa2a5e354c39f5bbeb0e90dfc082b0e7d84cbfdecd960bf48a
-
Filesize
271B
MD5d6650e3886f3c95fb42d4f0762b04173
SHA11da4b8bb6bb45d576616ad843cf6e4c2e9d4784b
SHA2569101f028c2288850be393281297500902b297c8b6ecf793292678b04a72709c9
SHA5121f82db4bd6ea401bb5610c21ed48848b9b61c55aabb4efada31dc677835b8e4451045006c4067e9cc51267a1c861765b49c3b3ab4c568be1dca0c0109fd8ceaa
-
C:\ProgramData\{B7E8E476-349D-60AA-651B-798B40E3CAEC}\Microsoft_Office_OfficeTelemetryAgentLogOn2016.xml
Filesize3KB
MD52dd9bafcbda61d5d509e48086cd0a986
SHA1821e66af11451535cdc249ec1493e5bca4d2cad2
SHA2562da208b3e33831803c1b830244636ca3d6cbc54fdd7e4add03059795c169002e
SHA5126f79656269570b309a5697b007245dff4983e6c20b9c3857ba1cc088ad4f7aec3b465e5fafc4f97b584cca88f6984ef90bbbdc499c20440f0f15da04ea79d528
-
Filesize
575B
MD50dccb4a744fba717d59b35ea33679620
SHA12f3733a32560c424c0e7c627f016d872bf30f212
SHA2562c71a1524274d23cf66d3cee24a74592a2b9d0b9bd4a14999d8a6e53ebd33afc
SHA512bdda2d98fdd488594ecdb0b2552da2f4f25a3eb5a5a1aecf8cc17e32126ac9d878928425cbece7fd5ab601f4e182a3c150c852c3f0b0e0f0dca9a676c4cb5b8e
-
Filesize
3.5MB
MD59d04cf0ff7e95ad4b363c4a7da79d41e
SHA19e0a07252102ca1103c80e4295962b2ad38449ef
SHA256029d8ea6985c43ae05b04c017b1dea297abda245219cb74afcb61910ebb5e5d7
SHA5123fe0de997f771668a88c8cef2d62e22b34b6c5196504eea10b0cca38e87de7f6fdcc1312b81fcef4b60ed1badf5b73c6c696480f01bc8608913e88d367bec61e
-
Filesize
128B
MD52b4d6d3b95916f9810449019372fbbde
SHA12c9f59c51fc6b290f758aed25a899dba37459fc6
SHA256cea19b915390806a9677165794194c66b19e3198a342d51e5a880e7b55768ac7
SHA5125cbb012b89989d53a7814dcb9f0391a761ebea6a7c9d1dcaae0efb476e61b30ce678387c4ff6fcebea0643f96d2f3bf126cff9511a75c1780ec89b51ba79c8db
-
Filesize
714KB
MD59dd70d24b2657a9254b9fd536a4d06d5
SHA1348a1d210d7c4daef8ecdb692eadf3975971e8ee
SHA256d0ac0e9021c6e231c60256198309b7f72ce4c5e772cf343b5456c2ce0664b9bd
SHA512dee5bfe83fdf196c78ee255e50a25994220ce9ecac22eb24323df70e668714d7a810b67ddace7809d9d7e2160a35c4603deedb64b1660d82dde58586c34d2ab6
-
Filesize
714KB
MD58915e2f468e54fb9a02fa9fc54fb7363
SHA1a279e025182846415139269b2922ef17dea5b062
SHA25626e056839c14f2bdbe6f847913146ac29a6d83a429b470395699d32b70aef3cd
SHA512872ab7039c1ca93fd76e3dbc211564fab0638cc888d07c1506ae1ed6cc09b17a6936144f2f6fe3d3019b81e9fa8624c050b6be6317f1f9f9b63bea70fcc964d0
-
Filesize
714KB
MD58915e2f468e54fb9a02fa9fc54fb7363
SHA1a279e025182846415139269b2922ef17dea5b062
SHA25626e056839c14f2bdbe6f847913146ac29a6d83a429b470395699d32b70aef3cd
SHA512872ab7039c1ca93fd76e3dbc211564fab0638cc888d07c1506ae1ed6cc09b17a6936144f2f6fe3d3019b81e9fa8624c050b6be6317f1f9f9b63bea70fcc964d0
-
Filesize
714KB
MD58915e2f468e54fb9a02fa9fc54fb7363
SHA1a279e025182846415139269b2922ef17dea5b062
SHA25626e056839c14f2bdbe6f847913146ac29a6d83a429b470395699d32b70aef3cd
SHA512872ab7039c1ca93fd76e3dbc211564fab0638cc888d07c1506ae1ed6cc09b17a6936144f2f6fe3d3019b81e9fa8624c050b6be6317f1f9f9b63bea70fcc964d0
-
Filesize
714KB
MD59dd70d24b2657a9254b9fd536a4d06d5
SHA1348a1d210d7c4daef8ecdb692eadf3975971e8ee
SHA256d0ac0e9021c6e231c60256198309b7f72ce4c5e772cf343b5456c2ce0664b9bd
SHA512dee5bfe83fdf196c78ee255e50a25994220ce9ecac22eb24323df70e668714d7a810b67ddace7809d9d7e2160a35c4603deedb64b1660d82dde58586c34d2ab6