Analysis

  • max time kernel
    24s
  • max time network
    17s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/02/2023, 21:01

Errors

Reason
Machine shutdown

General

  • Target

    SetupExitLag_v4239.exe

  • Size

    18.3MB

  • MD5

    473499d54eeb5f4abb893ce5b7eeb954

  • SHA1

    3b276b4cc513ee36444180e02bc6858427c49dc8

  • SHA256

    0f03d81bf6f3c68d07e13d1fb837273fb1fddb3719ed428caa5c9781cfabf25e

  • SHA512

    8aa367a35cf827f5643bbc336b36307092b6b5fe1c31dbf56183b1c901a7fef865093639585a5d76401605855f5ed5fe22b6581a1acec57a7bdea2391320a28a

  • SSDEEP

    393216:FjMT6W+wfoK9hA1ZvomzyaMHl4vFQg0jlN+gRjGajQq1daNFEU+:Fbq90lwHKygILpRZDOGf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 26 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SetupExitLag_v4239.exe
    "C:\Users\Admin\AppData\Local\Temp\SetupExitLag_v4239.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Local\Temp\is-4P9AV.tmp\SetupExitLag_v4239.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-4P9AV.tmp\SetupExitLag_v4239.tmp" /SL5="$B0060,18769793,227328,C:\Users\Admin\AppData\Local\Temp\SetupExitLag_v4239.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3864
      • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\DriverCacheCleaner.exe
        "C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\DriverCacheCleaner.exe"
        3⤵
        • Executes dropped EXE
        PID:4080
      • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\tools\amd64\certinst.exe
        "C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\tools\amd64\certinst.exe" C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\root.cer
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:3492
      • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\lwf\win10\amd64\snetcfg.exe
        "C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\lwf\win10\amd64\snetcfg.exe" -v -l ndextlag_lwf.inf -c s -i nt_ndextlag
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:3412
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{a4de0481-101c-8843-b664-7e8f49143213}\ndextlag_lwf.inf" "9" "49ef4f4d3" "0000000000000178" "WinSta0\Default" "000000000000017C" "208" "C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\lwf\win10\amd64"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:5040
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1800

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-4P9AV.tmp\SetupExitLag_v4239.tmp

          Filesize

          1.2MB

          MD5

          ce09dd687a3aed7cdb87e8a285fc10cb

          SHA1

          f5e05189f92b38341ebfdb92e01088b100ad4862

          SHA256

          a27f666ebe1d7b5ca33b0676470fca993df8bedbeda0828d397ddd3856455363

          SHA512

          3f5bb5d86a42dc9a90cc8d54cbf85408afad574d32893d4a5ab1c7fe1c5e733e83898b5884b1827a414073b7f3c45e42ee67a0a61093247bcd0eb4b5b8957f85

        • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\DriverCacheCleaner.exe

          Filesize

          200KB

          MD5

          690378fc7d9b6ab25daeeea96049ff71

          SHA1

          c8b1579ed0da6b6194670d9d1f99db39a476ae85

          SHA256

          f5448fd3bc9b33597d24c6d6f3f576bc642a64aa1cb9a83877b1c58dce6f383c

          SHA512

          bdc83e9e700f92496807d0f617fa1ecca6b3da4f28bd3ac2231eec9cffbacf41b228dd28d2d5983be9a9dd07e246b2dc70d701b999cdcd24751dec816aafc700

        • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\DriverCacheCleaner.exe

          Filesize

          200KB

          MD5

          690378fc7d9b6ab25daeeea96049ff71

          SHA1

          c8b1579ed0da6b6194670d9d1f99db39a476ae85

          SHA256

          f5448fd3bc9b33597d24c6d6f3f576bc642a64aa1cb9a83877b1c58dce6f383c

          SHA512

          bdc83e9e700f92496807d0f617fa1ecca6b3da4f28bd3ac2231eec9cffbacf41b228dd28d2d5983be9a9dd07e246b2dc70d701b999cdcd24751dec816aafc700

        • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WINPKF~1\lwf\win10\amd64\ndextlag.cat

          Filesize

          10KB

          MD5

          07233c93bcf5e88dd77cfeed420fd49a

          SHA1

          4ca449033cbf525d724384350ef7f41e8e5434de

          SHA256

          3e0dfbaa29d24e891565fad018d5e74ee78bab72a2f23f07116d0a4faf8ac967

          SHA512

          358490f72ab0d5cfb98cc5fffa9e4251d64fe4ac41d9114a0c163a6b64c963fdad823df64f5618529258b51f258ab83d8c6cfb9850f3b7beda386d67ff9b820a

        • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WINPKF~1\lwf\win10\amd64\ndextlag.sys

          Filesize

          47KB

          MD5

          5c6b0075104b71bc4f957e84cbcf7439

          SHA1

          fe72de312330a07a73c45b2a9979875b6c67c9f8

          SHA256

          9712b1d5db9198c01cd1de36a821cbac849b27d5a1100a5e12ec057d475c31ad

          SHA512

          a11b764ea160dd6c1d816bf53f1caa335df83b147e7583822066781c2ced3042ec374eb0186ee754b381a11905a9d40450c065626caf7ca49544268073684afc

        • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\lwf\win10\amd64\ndextlag_lwf.inf

          Filesize

          2KB

          MD5

          560b7a74f86e5e9706f891349cbd0b40

          SHA1

          c8609aa1f96f8c05e5e4a8f5c11303adbf145cb6

          SHA256

          be7dcb994db84ab2e9a39127cf5bbee8be03c87c66a17559296e8465ed13bff3

          SHA512

          dd952a971a8824087aec15b1ca8bf7cd6059214865f97644be84a975df43d172240dff0df6765b7871988ef877b47142e0ab07a9d537b0b791c428684301d7bf

        • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\lwf\win10\amd64\snetcfg.exe

          Filesize

          15KB

          MD5

          3b646b9d750aadd3dc5e26d08ea5b285

          SHA1

          a396e740a34da1112621efca0b7309dba9706cf5

          SHA256

          c80d994761ec106e15232ca38aeda7e673d82888644fc8e71d6943c2af26f3e7

          SHA512

          4e448d4d2b10d44f09e337856c3e133e99a41448fb132fb675805c140d22bd85602ee130b6204a6a17f5391946156c133a975e0f411dd1f38abd30cd53635d2d

        • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\lwf\win10\amd64\snetcfg.exe

          Filesize

          15KB

          MD5

          3b646b9d750aadd3dc5e26d08ea5b285

          SHA1

          a396e740a34da1112621efca0b7309dba9706cf5

          SHA256

          c80d994761ec106e15232ca38aeda7e673d82888644fc8e71d6943c2af26f3e7

          SHA512

          4e448d4d2b10d44f09e337856c3e133e99a41448fb132fb675805c140d22bd85602ee130b6204a6a17f5391946156c133a975e0f411dd1f38abd30cd53635d2d

        • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\root.cer

          Filesize

          1KB

          MD5

          04fc6a1705148f92caf75715640e831a

          SHA1

          3c9ef70fc04ef0f94ff7c8b3fd14ac98e2f9a404

          SHA256

          77905966359b8c8894e0ef9a6e91025d4f1904218f672a4e7cd02fdf4cd635af

          SHA512

          1dc1677039fb2625d200f0b6c77a594b865e2dcb81435fd89b95fb631264a992e6675177c98ad217019ce964f2512a2bde609c7265c3708dc0526430b756a398

        • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\tools\amd64\certinst.exe

          Filesize

          112KB

          MD5

          9d7c89df581aa64f04eab76c2fa22104

          SHA1

          a71c857390a7fd1bccf820fbdbb6023acc2f0bd3

          SHA256

          4d04a96e8d3505a7139275d63ea3147343f43af50ba38638a7eb212b60ff09b3

          SHA512

          204bde8918ee9019f1f19dd58237b3eebb5f20635564ddcd809efba5051879bed3f99abb4204368824f6037e59af0f03fa435ada5028b22072f111fc4c04dd27

        • C:\Users\Admin\AppData\Local\Temp\is-RSE2M.tmp\WinpkFilter\tools\amd64\certinst.exe

          Filesize

          112KB

          MD5

          9d7c89df581aa64f04eab76c2fa22104

          SHA1

          a71c857390a7fd1bccf820fbdbb6023acc2f0bd3

          SHA256

          4d04a96e8d3505a7139275d63ea3147343f43af50ba38638a7eb212b60ff09b3

          SHA512

          204bde8918ee9019f1f19dd58237b3eebb5f20635564ddcd809efba5051879bed3f99abb4204368824f6037e59af0f03fa435ada5028b22072f111fc4c04dd27

        • C:\Users\Admin\AppData\Local\Temp\{A4DE0~1\ndextlag.cat

          Filesize

          10KB

          MD5

          07233c93bcf5e88dd77cfeed420fd49a

          SHA1

          4ca449033cbf525d724384350ef7f41e8e5434de

          SHA256

          3e0dfbaa29d24e891565fad018d5e74ee78bab72a2f23f07116d0a4faf8ac967

          SHA512

          358490f72ab0d5cfb98cc5fffa9e4251d64fe4ac41d9114a0c163a6b64c963fdad823df64f5618529258b51f258ab83d8c6cfb9850f3b7beda386d67ff9b820a

        • C:\Users\Admin\AppData\Local\Temp\{A4DE0~1\ndextlag.sys

          Filesize

          47KB

          MD5

          5c6b0075104b71bc4f957e84cbcf7439

          SHA1

          fe72de312330a07a73c45b2a9979875b6c67c9f8

          SHA256

          9712b1d5db9198c01cd1de36a821cbac849b27d5a1100a5e12ec057d475c31ad

          SHA512

          a11b764ea160dd6c1d816bf53f1caa335df83b147e7583822066781c2ced3042ec374eb0186ee754b381a11905a9d40450c065626caf7ca49544268073684afc

        • C:\Users\Admin\AppData\Local\Temp\{a4de0481-101c-8843-b664-7e8f49143213}\ndextlag_lwf.inf

          Filesize

          2KB

          MD5

          560b7a74f86e5e9706f891349cbd0b40

          SHA1

          c8609aa1f96f8c05e5e4a8f5c11303adbf145cb6

          SHA256

          be7dcb994db84ab2e9a39127cf5bbee8be03c87c66a17559296e8465ed13bff3

          SHA512

          dd952a971a8824087aec15b1ca8bf7cd6059214865f97644be84a975df43d172240dff0df6765b7871988ef877b47142e0ab07a9d537b0b791c428684301d7bf

        • C:\Windows\INF\oem2.inf

          Filesize

          2KB

          MD5

          560b7a74f86e5e9706f891349cbd0b40

          SHA1

          c8609aa1f96f8c05e5e4a8f5c11303adbf145cb6

          SHA256

          be7dcb994db84ab2e9a39127cf5bbee8be03c87c66a17559296e8465ed13bff3

          SHA512

          dd952a971a8824087aec15b1ca8bf7cd6059214865f97644be84a975df43d172240dff0df6765b7871988ef877b47142e0ab07a9d537b0b791c428684301d7bf

        • C:\Windows\System32\DriverStore\FileRepository\ndextlag_lwf.inf_amd64_74752af70c6e7e55\ndextlag_lwf.inf

          Filesize

          2KB

          MD5

          560b7a74f86e5e9706f891349cbd0b40

          SHA1

          c8609aa1f96f8c05e5e4a8f5c11303adbf145cb6

          SHA256

          be7dcb994db84ab2e9a39127cf5bbee8be03c87c66a17559296e8465ed13bff3

          SHA512

          dd952a971a8824087aec15b1ca8bf7cd6059214865f97644be84a975df43d172240dff0df6765b7871988ef877b47142e0ab07a9d537b0b791c428684301d7bf

        • memory/2668-129-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-152-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-133-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-134-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-135-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-137-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-138-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-136-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-139-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-140-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-141-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-142-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-143-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-144-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-146-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-147-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-148-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-149-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/2668-151-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-132-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-145-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-153-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/2668-154-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-155-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-210-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/2668-118-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-131-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-130-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-128-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-127-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-126-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-125-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-124-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-123-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-122-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-121-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-120-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/2668-119-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-168-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-173-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-174-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-175-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-176-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-177-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-178-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-179-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-181-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-182-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-180-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-171-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-170-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-169-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-172-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-167-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-166-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-165-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-164-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-163-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-183-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-184-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-158-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-159-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-162-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-161-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB

        • memory/3864-160-0x00000000776D0000-0x000000007785E000-memory.dmp

          Filesize

          1.6MB