Analysis

  • max time kernel
    148s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2023 19:49

General

  • Target

    file.exe

  • Size

    1.1MB

  • MD5

    7a66992f14ec9015181ed2d580c190ff

  • SHA1

    9674bf45d8017f7753ddd6e106a8974bb87860c0

  • SHA256

    34d3c6e0521570cf69ae828b240b19b3314e9b63d534d9a62ce81f6ac5eee8f7

  • SHA512

    e499c16f7cd9516e72745618443630bc9ca0218bc31118c49dde9ca63ffb067e65fd8b62c0326c80204156ffc030d1163910440197905be7333f64f056776dc7

  • SSDEEP

    24576:bEpFFe69Mk7fdcsaiWsEzJqIV9oM2PiUbDUrs5n9e78PB5I7QQq:bE0Ns0EQ9oMAiyDUrs5k7cB5EQ

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Qytyaworpiotpd.tmp",Edoqqdswdffqipe
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4236
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 23759
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1556
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:1300
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4976
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 544
          2⤵
          • Program crash
          PID:888
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1952 -ip 1952
        1⤵
          PID:3184
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:5040
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k LocalService
            1⤵
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1304
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\export.dll",HhQKMk9L
              2⤵
              • Loads dropped DLL
              • Checks processor information in registry
              PID:4448

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\WindowsPowerShell\Modules\export.dll

            Filesize

            752KB

            MD5

            5b693aef7533768825880091be4e666e

            SHA1

            e88b8ecee6fe7881d354697e6c3fd609efe3072a

            SHA256

            1e7f47a19f77ae27c3cea614d75ba983cb7e6c5ee573d840f21eaf1514bba9d0

            SHA512

            d86846c2f5545a9507362251cf971ece668fd0fd22f7ebcbe007f7ee85ec51b125e882a3b7748dda7518e328b207c61565e466acbf073cb6ee533aa4aeae6d99

          • C:\Program Files (x86)\WindowsPowerShell\Modules\export.dll

            Filesize

            752KB

            MD5

            5b693aef7533768825880091be4e666e

            SHA1

            e88b8ecee6fe7881d354697e6c3fd609efe3072a

            SHA256

            1e7f47a19f77ae27c3cea614d75ba983cb7e6c5ee573d840f21eaf1514bba9d0

            SHA512

            d86846c2f5545a9507362251cf971ece668fd0fd22f7ebcbe007f7ee85ec51b125e882a3b7748dda7518e328b207c61565e466acbf073cb6ee533aa4aeae6d99

          • C:\ProgramData\{B6600257-EE8E-BC17-51D3-445AF22F69ED}\Microsoft.AsyncTextService_10.0.19041.1023_neutral__8wekyb3d8bbwe.xml

            Filesize

            2KB

            MD5

            2240070d6603ab019cd125005cf38b7b

            SHA1

            ca96d028f51a7d5ec16630b48935f26c72794b0a

            SHA256

            7b3b1b641ebbda5397a11af86cb347b0f644ab439341c62b1c81d6990e6f75bc

            SHA512

            95c6f48f717d9103d30c31e00b7ff3a0d235693a8fffed772c0a0c39107bf3003ac84d6c78e2af566d91a88fa523dcc2c523dcc707d19fc77799832d548f330c

          • C:\ProgramData\{B6600257-EE8E-BC17-51D3-445AF22F69ED}\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe.xml

            Filesize

            9KB

            MD5

            996f11041df0526341cebbbd40a98390

            SHA1

            37f652515ef8c662840086d743f7f68d327cce52

            SHA256

            bb39de067132d2ccbb7a3c066743010f070a3c3856f42ccc892da0b40012771e

            SHA512

            6cafa4b3bd8c56d20859a4f8fb7109e3ca4c690d0746b13f9f2eaa19d88bfca469dc45d71fb91f5658f9cd300f285aafb9e212ebd7c1496aadb6046da4e56c03

          • C:\ProgramData\{B6600257-EE8E-BC17-51D3-445AF22F69ED}\Microsoft.Microsoft3DViewer_6.1908.2042.0_neutral_~_8wekyb3d8bbwe.xml

            Filesize

            7KB

            MD5

            f4b603547f83e5cb97e4ad4538aac812

            SHA1

            c225c8c582ad9fdd9e81291fcb4af711deb92508

            SHA256

            268d79fcfc4de72faeb0433e371176fedcfc0c33b0c9484b02c9936c3c6d4218

            SHA512

            d285740008ed9e6dbfc4284dfb5418e130f1eb4b2fb758fb2f8e86e0c5c557e050b415eaa66858c37cd95ddfd4ed6a40be77a333f254ec142982d2e3f3cc37cf

          • C:\ProgramData\{B6600257-EE8E-BC17-51D3-445AF22F69ED}\Twesqary.tmp

            Filesize

            3.5MB

            MD5

            6603ba9ae899acdc8a92e4c4d61bfcf8

            SHA1

            d60bed146ca718aa4e8b4c3ba501ff092b2206f3

            SHA256

            77a1cbf36bfd24c753801b5ea63e93cba97fba1b3e3537461f077e367d0abfbc

            SHA512

            7c8925c6466806c91bdca5b9ddcc3d92f067d1d9a976a2c2f39c2505df5319a1e045c8fc48df0744de68032178fb9b00081c528bbb98166c3cfc816cf68c2f93

          • C:\ProgramData\{B6600257-EE8E-BC17-51D3-445AF22F69ED}\Twesqary.tmp

            Filesize

            3.5MB

            MD5

            6603ba9ae899acdc8a92e4c4d61bfcf8

            SHA1

            d60bed146ca718aa4e8b4c3ba501ff092b2206f3

            SHA256

            77a1cbf36bfd24c753801b5ea63e93cba97fba1b3e3537461f077e367d0abfbc

            SHA512

            7c8925c6466806c91bdca5b9ddcc3d92f067d1d9a976a2c2f39c2505df5319a1e045c8fc48df0744de68032178fb9b00081c528bbb98166c3cfc816cf68c2f93

          • C:\ProgramData\{B6600257-EE8E-BC17-51D3-445AF22F69ED}\edb.jcp

            Filesize

            8KB

            MD5

            c826cf0fe94cfb79c23bd04630acb722

            SHA1

            e8e2babb652dfa84cbd20c007c4a1f6e435c120c

            SHA256

            6fb2188180d070a523d282882b2e7ba593ece8e2a8b01c47d55dbab7b852d523

            SHA512

            371651e5fb1c1e137b7c8a2653bf677a5d1158c1c34c6afd4bc6d4ce84215239ea1354b6b7f25e49620f3c1a6a5e3a31b2c2938e32a57e144d0c3010230c64d3

          • C:\ProgramData\{B6600257-EE8E-BC17-51D3-445AF22F69ED}\edbtmp.log

            Filesize

            64KB

            MD5

            a837784c7c1026936fcd1705045afda4

            SHA1

            067b38e0467bfe15497ce925f99f1a656a06cc66

            SHA256

            2edf25e7126f6e23ad22ed858db278cc1f773d87f3989ea83305bd77d4639791

            SHA512

            86a0a4ac85ecbbacde8c26cbd6631eb734ee4a7f3b4f4258d80c7ed4f7316fad3d69f3969440d808e61147e1bbbebd1e3bee49b25c57a534c4e47129e8ae5569

          • C:\Users\Admin\AppData\Local\Temp\Qytyaworpiotpd.tmp

            Filesize

            752KB

            MD5

            710af73b2d7e92d33fac751318c08101

            SHA1

            2208c96a528b1d96e18ae47ab274f303e4099fff

            SHA256

            72021339c18f79141f9867c30616cbbdc517471e44d16bfe81063e5c7dba56c3

            SHA512

            1f19138b8412b871ccf33ec351d28157b6571bc02cb1d338fc4c06bd77e9518bbdb3392d63b9bcdde2bd94746c232f90b4796363f83cecfd49e0470b6495ac1a

          • C:\Users\Admin\AppData\Local\Temp\Qytyaworpiotpd.tmp

            Filesize

            752KB

            MD5

            710af73b2d7e92d33fac751318c08101

            SHA1

            2208c96a528b1d96e18ae47ab274f303e4099fff

            SHA256

            72021339c18f79141f9867c30616cbbdc517471e44d16bfe81063e5c7dba56c3

            SHA512

            1f19138b8412b871ccf33ec351d28157b6571bc02cb1d338fc4c06bd77e9518bbdb3392d63b9bcdde2bd94746c232f90b4796363f83cecfd49e0470b6495ac1a

          • \??\c:\program files (x86)\windowspowershell\modules\export.dll

            Filesize

            752KB

            MD5

            5b693aef7533768825880091be4e666e

            SHA1

            e88b8ecee6fe7881d354697e6c3fd609efe3072a

            SHA256

            1e7f47a19f77ae27c3cea614d75ba983cb7e6c5ee573d840f21eaf1514bba9d0

            SHA512

            d86846c2f5545a9507362251cf971ece668fd0fd22f7ebcbe007f7ee85ec51b125e882a3b7748dda7518e328b207c61565e466acbf073cb6ee533aa4aeae6d99

          • memory/1304-158-0x00000000037D0000-0x000000000432B000-memory.dmp

            Filesize

            11.4MB

          • memory/1304-157-0x00000000037D0000-0x000000000432B000-memory.dmp

            Filesize

            11.4MB

          • memory/1304-171-0x00000000037D0000-0x000000000432B000-memory.dmp

            Filesize

            11.4MB

          • memory/1556-152-0x000001A4FA380000-0x000001A4FA63B000-memory.dmp

            Filesize

            2.7MB

          • memory/1556-149-0x000001A4FBDE0000-0x000001A4FBF20000-memory.dmp

            Filesize

            1.2MB

          • memory/1556-150-0x000001A4FBDE0000-0x000001A4FBF20000-memory.dmp

            Filesize

            1.2MB

          • memory/1556-151-0x0000000000FC0000-0x000000000126A000-memory.dmp

            Filesize

            2.7MB

          • memory/1952-132-0x0000000002236000-0x0000000002317000-memory.dmp

            Filesize

            900KB

          • memory/1952-133-0x0000000002370000-0x0000000002490000-memory.dmp

            Filesize

            1.1MB

          • memory/1952-135-0x0000000000400000-0x0000000000523000-memory.dmp

            Filesize

            1.1MB

          • memory/1952-138-0x0000000000400000-0x0000000000523000-memory.dmp

            Filesize

            1.1MB

          • memory/4236-143-0x00000000041F0000-0x0000000004330000-memory.dmp

            Filesize

            1.2MB

          • memory/4236-145-0x00000000041F0000-0x0000000004330000-memory.dmp

            Filesize

            1.2MB

          • memory/4236-146-0x0000000004269000-0x000000000426B000-memory.dmp

            Filesize

            8KB

          • memory/4236-142-0x00000000041F0000-0x0000000004330000-memory.dmp

            Filesize

            1.2MB

          • memory/4236-144-0x00000000041F0000-0x0000000004330000-memory.dmp

            Filesize

            1.2MB

          • memory/4236-141-0x00000000041F0000-0x0000000004330000-memory.dmp

            Filesize

            1.2MB

          • memory/4236-140-0x0000000004770000-0x00000000052CB000-memory.dmp

            Filesize

            11.4MB

          • memory/4236-139-0x0000000004770000-0x00000000052CB000-memory.dmp

            Filesize

            11.4MB

          • memory/4236-147-0x00000000041F0000-0x0000000004330000-memory.dmp

            Filesize

            1.2MB

          • memory/4236-153-0x0000000004770000-0x00000000052CB000-memory.dmp

            Filesize

            11.4MB

          • memory/4448-168-0x0000000004F90000-0x0000000005AEB000-memory.dmp

            Filesize

            11.4MB

          • memory/4448-167-0x0000000004F90000-0x0000000005AEB000-memory.dmp

            Filesize

            11.4MB