Analysis

  • max time kernel
    133s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2023 20:33

General

  • Target

    025208b3d2dc191ade69d312f02ae794a9a1b03952e959d7031460aa0100d23c.exe

  • Size

    1.1MB

  • MD5

    a0f0a5939391e1e6435891fcbd3c1f8f

  • SHA1

    240a65e3b2fc037e23b631689bdf2b56089b5ff1

  • SHA256

    025208b3d2dc191ade69d312f02ae794a9a1b03952e959d7031460aa0100d23c

  • SHA512

    e8f8acb13fc39a61e277ec562fb72a3381a6a2b6c912aa17b121010cc04b16b0406f69fafd36029106e6a258155f9a01470af551d63ed8e25dd908960e40030c

  • SSDEEP

    24576:Xo3ciGhHIfz+y/iHemincy/2JIGJZwYKl6cE5CjmXNeEh:XEGZIfzuHeminIN9Q61CjsN9

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 49 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\025208b3d2dc191ade69d312f02ae794a9a1b03952e959d7031460aa0100d23c.exe
    "C:\Users\Admin\AppData\Local\Temp\025208b3d2dc191ade69d312f02ae794a9a1b03952e959d7031460aa0100d23c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp",Dsdupihuqo
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:620
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 22362
        3⤵
        • Suspicious use of FindShellTrayWindow
        PID:1216
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k LocalService
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windows mail\ja-jp\forms_super.dll",IQIfODdTYTEx
      2⤵
      • Loads dropped DLL
      PID:816

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Darpeiwtweqqp.tmp
    Filesize

    3.5MB

    MD5

    04c2053583c6d5311d2a61cbbb535b5f

    SHA1

    8fb7c88ce44fe7d2ea751bafa97e09b244dde41c

    SHA256

    2b95fa7752d4d825519722a3d4b7107b41b39c61f5fdbb50230471cf0b568e72

    SHA512

    a77b035f5c488a42831796102f91b3d7046d2f51cc03c602d4312c82026b0da39c2d6f8faa1bffa1d30768a85b53633152b65fb9aceea5f277c4ac2c61eabcc8

  • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Darpeiwtweqqp.tmp
    Filesize

    3.5MB

    MD5

    a7c67bee057123fcb8e49f16c082b936

    SHA1

    be6b6ce71cc05e24d1766a4249e04fad26376f4b

    SHA256

    49c7e2d3558f6027fbc094d5c70f121e9d9c03fdb2c38bf8f5e40499b30e25ad

    SHA512

    0310eed44e6345b6bc02caa91e66d46097bdee140c28ca1bb6497c8dd3ed5abd6635d49fb290cc3ecce684e8ef9b3543e047e1b918cfa462527fa7da83fb2a69

  • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\GRINTL32.REST.trx_dll
    Filesize

    230KB

    MD5

    5f49fad25c36fc9dd9f9dbfbd5bb46ff

    SHA1

    25a15db46f03436e2b66f772206ee88dabdc4145

    SHA256

    6cf101ba3eb2f2f93c1ae41c59fce4661d4b4c79e6cf0a921123a94df97fa9a1

    SHA512

    b5cb326b1ad885073eafa25db0d98a41238b5c338bc79231c7a60c97d897b6ac36421f1794646c04dcb359947eda0c0afcbad20d245995224f63cb2b94a313bc

  • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Help_CValidator.H1D
    Filesize

    11KB

    MD5

    02ecb08e05bbd6fc17c3a5dcf53957ce

    SHA1

    6ed9a6936071eb90ece53f4eded8d5544704306e

    SHA256

    e088a33f93b425b768ae3a6341d99ecdb118329a00d7e04f92c673b91c5ace89

    SHA512

    fdfc65878a4271b1bab12dd290a975be0b207d880afe2543ffe42c1873c3175f2256e64cf7a239a921dd46e14b91b96d7fbe62be96b836f0c61044f4e4236c53

  • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Help_MValidator.H1D
    Filesize

    14KB

    MD5

    22cdd740dd49c78312a8e4988ce1e3b8

    SHA1

    338d9fa20a10d4a39a3350b4207538af46e95c32

    SHA256

    8119ad51853e5f35ef9f1e793275df64d86fe0c0e43c493aecec7081877a2cac

    SHA512

    0cdf1a65f771dd6a91e12f1d74bf1be39625d4cc444687e2c948df838a52f5389bf462d20666c0dd01498c829f6a7b3c957650b5192a21a437b06643c79e8ea5

  • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\Pending.GRL
    Filesize

    14KB

    MD5

    fffde3df0d91311b7fe3f9bc8642a9ec

    SHA1

    50987906817aab51e2cc29fbce47ac5f0936a44e

    SHA256

    bda9df3591bf7f67d4b31d23cffdcf927da6f00ae1b393f07aea69ba1c4344bc

    SHA512

    5e0766c25f54b03ca0325966ba059cbfb9cdb0aeae567106583fdff944d67522516acabb9b261e2fd434c1a5af5c5453a09c9dc494008253b0553a993c01d3d3

  • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\XLSLICER.DLL.trx_dll
    Filesize

    14KB

    MD5

    63d806c555088e6f1589d09a986fdbc5

    SHA1

    83642f4af4c12ca89b66b2f3c2310c873cf98694

    SHA256

    084c3b577d59fa3ec200c097cdba5d0aab99c015b350aec438f44e9322c6b54c

    SHA512

    e31ae6cd0595731e1057a5d736ef735cb8be2bb420b35f6793f329c6baf81c24f854f742a80dea97d9be3c0724288fa2a0f1d608f5bfcce757343d5e55c02d9d

  • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\background.png
    Filesize

    126KB

    MD5

    9adaf3a844ce0ce36bfed07fa2d7ef66

    SHA1

    3a804355d5062a6d2ed9653d66e9e4aebaf90bc0

    SHA256

    d3e8d47e8c1622ec10adef672ca7a8992748c4f0a4e75f877462e7e661069698

    SHA512

    e6988737153a0996b14e6baa45e8010ff46714fe7679d05a2676cc18e1c653e99227e7507cdae4f2b6a99b3c31478630e7e1ae13d0f7c12525406d8cf9867ca5

  • C:\ProgramData\{5BFBD38D-1E0D-2E81-7E4A-517A4E87BDFF}\folder.ico
    Filesize

    52KB

    MD5

    bbf9dbdc079c0cd95f78d728aa3912d4

    SHA1

    051f76cc8c6520768bac9559bb329abeebd70d7c

    SHA256

    bef53904908769ceeb60f8e0976c3194e73534f00f4afb65497c2091121b98b2

    SHA512

    af110c52c983f1cf55b3db7d375e03c8c9308e3cf9ee1c154c2b25cb3f8299f0c0ba87b47445f09f98659eb536184c245887a341733c11af713e9ecc15288b5d

  • C:\Users\Admin\AppData\Local\Temp\Dfuqft.tmp
    Filesize

    792KB

    MD5

    9e3ff54c77c7d43bfdf8cff1d31c3c51

    SHA1

    9681f127f0300093ac15d8a3fc16c289f0b9c045

    SHA256

    2c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d

    SHA512

    d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec

  • \??\c:\program files (x86)\windows mail\ja-jp\forms_super.dll
    Filesize

    792KB

    MD5

    2319455fe1a6edf4de9ca5412600b67c

    SHA1

    a6e54cbe95defe503804cda742cc7d10fcb59617

    SHA256

    c702b752203d5e859210fefafc57bca31977301ac4cc16aa47f781f93ccad6f6

    SHA512

    c8ba29e79b83893572f7b28b393171afdcf35f1ab09acbe3f1c2d19687b0c236d50886ee7e68ce53c38fbe065cf2c822d81b4d2f43ee576f395c822b3458e382

  • \Program Files (x86)\Windows Mail\ja-JP\forms_super.dll
    Filesize

    792KB

    MD5

    2319455fe1a6edf4de9ca5412600b67c

    SHA1

    a6e54cbe95defe503804cda742cc7d10fcb59617

    SHA256

    c702b752203d5e859210fefafc57bca31977301ac4cc16aa47f781f93ccad6f6

    SHA512

    c8ba29e79b83893572f7b28b393171afdcf35f1ab09acbe3f1c2d19687b0c236d50886ee7e68ce53c38fbe065cf2c822d81b4d2f43ee576f395c822b3458e382

  • \Program Files (x86)\Windows Mail\ja-JP\forms_super.dll
    Filesize

    792KB

    MD5

    2319455fe1a6edf4de9ca5412600b67c

    SHA1

    a6e54cbe95defe503804cda742cc7d10fcb59617

    SHA256

    c702b752203d5e859210fefafc57bca31977301ac4cc16aa47f781f93ccad6f6

    SHA512

    c8ba29e79b83893572f7b28b393171afdcf35f1ab09acbe3f1c2d19687b0c236d50886ee7e68ce53c38fbe065cf2c822d81b4d2f43ee576f395c822b3458e382

  • \Program Files (x86)\Windows Mail\ja-JP\forms_super.dll
    Filesize

    792KB

    MD5

    2319455fe1a6edf4de9ca5412600b67c

    SHA1

    a6e54cbe95defe503804cda742cc7d10fcb59617

    SHA256

    c702b752203d5e859210fefafc57bca31977301ac4cc16aa47f781f93ccad6f6

    SHA512

    c8ba29e79b83893572f7b28b393171afdcf35f1ab09acbe3f1c2d19687b0c236d50886ee7e68ce53c38fbe065cf2c822d81b4d2f43ee576f395c822b3458e382

  • \Program Files (x86)\Windows Mail\ja-JP\forms_super.dll
    Filesize

    792KB

    MD5

    2319455fe1a6edf4de9ca5412600b67c

    SHA1

    a6e54cbe95defe503804cda742cc7d10fcb59617

    SHA256

    c702b752203d5e859210fefafc57bca31977301ac4cc16aa47f781f93ccad6f6

    SHA512

    c8ba29e79b83893572f7b28b393171afdcf35f1ab09acbe3f1c2d19687b0c236d50886ee7e68ce53c38fbe065cf2c822d81b4d2f43ee576f395c822b3458e382

  • \Program Files (x86)\Windows Mail\ja-JP\forms_super.dll
    Filesize

    792KB

    MD5

    2319455fe1a6edf4de9ca5412600b67c

    SHA1

    a6e54cbe95defe503804cda742cc7d10fcb59617

    SHA256

    c702b752203d5e859210fefafc57bca31977301ac4cc16aa47f781f93ccad6f6

    SHA512

    c8ba29e79b83893572f7b28b393171afdcf35f1ab09acbe3f1c2d19687b0c236d50886ee7e68ce53c38fbe065cf2c822d81b4d2f43ee576f395c822b3458e382

  • \Users\Admin\AppData\Local\Temp\Dfuqft.tmp
    Filesize

    792KB

    MD5

    9e3ff54c77c7d43bfdf8cff1d31c3c51

    SHA1

    9681f127f0300093ac15d8a3fc16c289f0b9c045

    SHA256

    2c683e8b9889636eb8279bdb6cf9181e939021acb2cbbed109b27aab6f47861d

    SHA512

    d7b6ff58a48ce21250e13ffd1f57f041615e83cfd3fc2627ea0951a32ad8141fbe760765faada136cf3ab31c9165a0ad0f88ef95f35f58735d169046c257fcec

  • memory/620-67-0x00000000042F0000-0x0000000004430000-memory.dmp
    Filesize

    1.2MB

  • memory/620-69-0x0000000005590000-0x00000000056D0000-memory.dmp
    Filesize

    1.2MB

  • memory/620-56-0x0000000000000000-mapping.dmp
  • memory/620-63-0x0000000004A10000-0x0000000005567000-memory.dmp
    Filesize

    11.3MB

  • memory/620-65-0x0000000004A10000-0x0000000005567000-memory.dmp
    Filesize

    11.3MB

  • memory/620-66-0x0000000004A10000-0x0000000005567000-memory.dmp
    Filesize

    11.3MB

  • memory/620-68-0x00000000042F0000-0x0000000004430000-memory.dmp
    Filesize

    1.2MB

  • memory/620-81-0x0000000004A10000-0x0000000005567000-memory.dmp
    Filesize

    11.3MB

  • memory/620-74-0x00000000042F0000-0x0000000004430000-memory.dmp
    Filesize

    1.2MB

  • memory/620-73-0x00000000042F0000-0x0000000004430000-memory.dmp
    Filesize

    1.2MB

  • memory/620-72-0x0000000005590000-0x00000000056D0000-memory.dmp
    Filesize

    1.2MB

  • memory/816-97-0x0000000000000000-mapping.dmp
  • memory/816-106-0x00000000041C0000-0x0000000004D17000-memory.dmp
    Filesize

    11.3MB

  • memory/816-104-0x00000000041C0000-0x0000000004D17000-memory.dmp
    Filesize

    11.3MB

  • memory/816-107-0x00000000041C0000-0x0000000004D17000-memory.dmp
    Filesize

    11.3MB

  • memory/816-108-0x00000000041C0000-0x0000000004D17000-memory.dmp
    Filesize

    11.3MB

  • memory/1204-88-0x0000000004260000-0x0000000004DB7000-memory.dmp
    Filesize

    11.3MB

  • memory/1204-89-0x0000000004260000-0x0000000004DB7000-memory.dmp
    Filesize

    11.3MB

  • memory/1204-86-0x0000000004260000-0x0000000004DB7000-memory.dmp
    Filesize

    11.3MB

  • memory/1204-109-0x0000000004260000-0x0000000004DB7000-memory.dmp
    Filesize

    11.3MB

  • memory/1216-75-0x00000000FF223CEC-mapping.dmp
  • memory/1216-76-0x00000000022F0000-0x0000000002430000-memory.dmp
    Filesize

    1.2MB

  • memory/1216-78-0x00000000022F0000-0x0000000002430000-memory.dmp
    Filesize

    1.2MB

  • memory/1216-79-0x000007FEFB9E1000-0x000007FEFB9E3000-memory.dmp
    Filesize

    8KB

  • memory/1216-80-0x0000000001F10000-0x00000000021CF000-memory.dmp
    Filesize

    2.7MB

  • memory/1216-77-0x0000000000150000-0x00000000003FE000-memory.dmp
    Filesize

    2.7MB

  • memory/1216-70-0x0000000000150000-0x00000000003FE000-memory.dmp
    Filesize

    2.7MB

  • memory/1464-54-0x0000000000220000-0x000000000030C000-memory.dmp
    Filesize

    944KB

  • memory/1464-55-0x00000000758B1000-0x00000000758B3000-memory.dmp
    Filesize

    8KB

  • memory/1464-57-0x0000000000220000-0x000000000030C000-memory.dmp
    Filesize

    944KB

  • memory/1464-58-0x0000000001EC0000-0x0000000001FF2000-memory.dmp
    Filesize

    1.2MB

  • memory/1464-60-0x0000000000400000-0x0000000000538000-memory.dmp
    Filesize

    1.2MB