Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2023 23:38

General

  • Target

    DriverUpdate.exe

  • Size

    1.5MB

  • MD5

    c229f641cb62142c5a1a68eb4791676e

  • SHA1

    2a933433baf85c877bae53e41c1cacf189f1c6db

  • SHA256

    316eee8d26094f581949aadc0c35bd7312e95055f54db48dff81f80ab9180061

  • SHA512

    d4ef506e15df222ce005bdb1ae5fce2662dd21fd64b2cbbf0e1787c9c8390fcaa872a0f84dc4e0b1da3b371069c0c74f181cd7ba27cd0d9cab11766ef1971690

  • SSDEEP

    24576:Y7dcamtYPq/30a6gW38BrHFddmmB72CXXS20UGTb1urz5mR:amCPqv56gWMNHhmOXiVjxurzsR

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe
    "C:\Users\Admin\AppData\Local\Temp\DriverUpdate.exe"
    1⤵
    • Loads dropped DLL
    PID:4412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsn6921.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    ea60c7bd5edd6048601729bd31362c16

    SHA1

    6e6919d969eb61a141595014395b6c3f44139073

    SHA256

    4e72c8b4d36f128b25281440e59e39af7ec2080d02e024f35ac413d769d91f39

    SHA512

    f9dc35220697153bb06e3a06caf645079881cb75aed008dbe5381ecaf3442d5be03500b36bbca8b3d114845fac3d667ddf4063c16bc35d29bbea862930939993

  • C:\Users\Admin\AppData\Local\Temp\nsn6921.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    ea60c7bd5edd6048601729bd31362c16

    SHA1

    6e6919d969eb61a141595014395b6c3f44139073

    SHA256

    4e72c8b4d36f128b25281440e59e39af7ec2080d02e024f35ac413d769d91f39

    SHA512

    f9dc35220697153bb06e3a06caf645079881cb75aed008dbe5381ecaf3442d5be03500b36bbca8b3d114845fac3d667ddf4063c16bc35d29bbea862930939993

  • C:\Users\Admin\AppData\Local\Temp\nsn6921.tmp\NScurl.dll

    Filesize

    3.6MB

    MD5

    16e134ec014d74e9b798c9b3fae3ddcc

    SHA1

    1a8cc259f7b193018167484c30d8803b09ed228e

    SHA256

    eda02e626e8ca71dbff5389c062f9e9542661b43413b0a37ae3d262567145ce2

    SHA512

    3e5742934076066125b82f4b2da45a499b22440252dff4ec14660fc688f075f886ac76de89f4c6647a8c85e483c83507edfcb22e3dbe3363e509ae18b1c4636e

  • C:\Users\Admin\AppData\Local\Temp\nsn6921.tmp\System.dll

    Filesize

    11KB

    MD5

    55a26d7800446f1373056064c64c3ce8

    SHA1

    80256857e9a0a9c8897923b717f3435295a76002

    SHA256

    904fd5481d72f4e03b01a455f848dedd095d0fb17e33608e0d849f5196fb6ff8

    SHA512

    04b8ab7a85c26f188c0a06f524488d6f2ac2884bf107c860c82e94ae12c3859f825133d78338fd2b594dfc48f7dc9888ae76fee786c6252a5c77c88755128a5b

  • C:\Users\Admin\AppData\Local\Temp\nsn6921.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    c051c86f6fa84ac87efb0cf3961950a1

    SHA1

    f18f4bb803099b80a3a013ecb03fea11cff0ac01

    SHA256

    d0949b4c0640ee6a80db5a7f6d93fc631ed194de197d79bf080ec1752c6f1166

    SHA512

    6e9de5d07aaed2ac297faa5049d567884d817ed94dece055d96913ac8e497ade6f0ff5c28bae7cc7d3ac41f8795efb9939e6d12061a3c446d5d2a3e2287d49d2

  • C:\Users\Admin\AppData\Local\Temp\nsn6921.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    c051c86f6fa84ac87efb0cf3961950a1

    SHA1

    f18f4bb803099b80a3a013ecb03fea11cff0ac01

    SHA256

    d0949b4c0640ee6a80db5a7f6d93fc631ed194de197d79bf080ec1752c6f1166

    SHA512

    6e9de5d07aaed2ac297faa5049d567884d817ed94dece055d96913ac8e497ade6f0ff5c28bae7cc7d3ac41f8795efb9939e6d12061a3c446d5d2a3e2287d49d2

  • C:\Users\Admin\AppData\Local\Temp\nsn6921.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    c051c86f6fa84ac87efb0cf3961950a1

    SHA1

    f18f4bb803099b80a3a013ecb03fea11cff0ac01

    SHA256

    d0949b4c0640ee6a80db5a7f6d93fc631ed194de197d79bf080ec1752c6f1166

    SHA512

    6e9de5d07aaed2ac297faa5049d567884d817ed94dece055d96913ac8e497ade6f0ff5c28bae7cc7d3ac41f8795efb9939e6d12061a3c446d5d2a3e2287d49d2

  • C:\Users\Admin\AppData\Local\Temp\nsn6921.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    c051c86f6fa84ac87efb0cf3961950a1

    SHA1

    f18f4bb803099b80a3a013ecb03fea11cff0ac01

    SHA256

    d0949b4c0640ee6a80db5a7f6d93fc631ed194de197d79bf080ec1752c6f1166

    SHA512

    6e9de5d07aaed2ac297faa5049d567884d817ed94dece055d96913ac8e497ade6f0ff5c28bae7cc7d3ac41f8795efb9939e6d12061a3c446d5d2a3e2287d49d2

  • C:\Users\Admin\AppData\Local\Temp\nsn6921.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    ee449b0adce56fbfa433b0239f3f81be

    SHA1

    ec1e4f9815ea592a3f19b1fe473329b8ddfa201c

    SHA256

    c1cc3aa4326e83a73a778dee0cf9afcc03a6bafb0a32cea791a27eb9c2288985

    SHA512

    22fb25bc7628946213e6e970a865d3fbd50d12ce559c37d6848a82c28fa6be09fedffc3b87d5aea8dcfe8dfc4e0f129d9f02e32dae764b8e6a08332b42386686

  • C:\Users\Admin\AppData\Local\Temp\nsn6921.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    ee449b0adce56fbfa433b0239f3f81be

    SHA1

    ec1e4f9815ea592a3f19b1fe473329b8ddfa201c

    SHA256

    c1cc3aa4326e83a73a778dee0cf9afcc03a6bafb0a32cea791a27eb9c2288985

    SHA512

    22fb25bc7628946213e6e970a865d3fbd50d12ce559c37d6848a82c28fa6be09fedffc3b87d5aea8dcfe8dfc4e0f129d9f02e32dae764b8e6a08332b42386686

  • C:\Users\Admin\AppData\Local\Temp\nsn6921.tmp\nsResize.dll

    Filesize

    4KB

    MD5

    aa849e7407cf349021812f62c001e097

    SHA1

    4cbb55b1d1dd95dcb7a36b5a44121ad4934539af

    SHA256

    29b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5

    SHA512

    4556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de

  • memory/4412-143-0x00000000042E1000-0x00000000042E3000-memory.dmp

    Filesize

    8KB

  • memory/4412-144-0x0000000073680000-0x0000000073689000-memory.dmp

    Filesize

    36KB

  • memory/4412-145-0x0000000073680000-0x0000000073689000-memory.dmp

    Filesize

    36KB