Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2023, 05:11

General

  • Target

    DriverUpdate(1).exe

  • Size

    1.5MB

  • MD5

    18c16546d18fc8b2229cc65b4780e552

  • SHA1

    4b15473b91d13a32ad317125bf33ecefefd76d42

  • SHA256

    a2a13c16048ab3b3920eed07b0b6eb7f57146cddc3bdf8e9e474fd31de610c90

  • SHA512

    3fb0da6e8aa3d22a764527231a3acd69f8012e7021a17966d904c7dec6c978843c520e4181bc8726ede274f2efbac2dfdc284c70c8ba3848f2dfa37c6486cac4

  • SSDEEP

    24576:u7ziYrZOf9sZ7oUh3+L4UoAojajxLoBUfIEO1br0KUrS8cLV/5zYrDsmGWlxBrWd:f9fKdl+LC8oBuI3HUrSth/5zY/iWlxBG

Score
8/10
upx

Malware Config

Signatures

  • Downloads MZ/PE file
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 21 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DriverUpdate(1).exe
    "C:\Users\Admin\AppData\Local\Temp\DriverUpdate(1).exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\SysWOW64\cmd.exe
      cmd /Q /C "C:\Windows\System32\wbem\wmic.exe qfe get hotfixid | C:\Windows\System32\findstr.exe "^KB3033929""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Windows\SysWOW64\wbem\WMIC.exe
        C:\Windows\System32\wbem\wmic.exe qfe get hotfixid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1408
      • C:\Windows\SysWOW64\findstr.exe
        C:\Windows\System32\findstr.exe "^KB3033929"
        3⤵
          PID:1940
      • C:\Windows\SysWOW64\wusa.exe
        "C:\Windows\System32\wusa.exe" "C:\Users\Admin\AppData\Local\Temp\microsoft_win_patch_for_dsone1.msu" /quiet /norestart
        2⤵
        • Drops file in Windows directory
        PID:304
      • C:\Windows\SysWOW64\cmd.exe
        cmd /Q /C "C:\Windows\System32\wbem\wmic.exe qfe get hotfixid | C:\Windows\System32\findstr.exe "^KB2506143""
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1944
        • C:\Windows\SysWOW64\wbem\WMIC.exe
          C:\Windows\System32\wbem\wmic.exe qfe get hotfixid
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1976
        • C:\Windows\SysWOW64\findstr.exe
          C:\Windows\System32\findstr.exe "^KB2506143"
          3⤵
            PID:1492
        • C:\Users\Admin\AppData\Local\Temp\DSOne.exe
          "C:\Users\Admin\AppData\Local\Temp\DSOne.exe" /LANGUAGE:1033 /WELCOME_SHOWN:true /AGREE_TO_LICENSE:true /TID: /BOOTSTRAPPERPATH:"C:\Users\Admin\AppData\Local\Temp\DriverUpdate(1).exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Windows\SysWOW64\cmd.exe
            cmd /Q /C "C:\Windows\System32\wbem\wmic.exe qfe get hotfixid | C:\Windows\System32\findstr.exe "^KB3033929""
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2028
            • C:\Windows\SysWOW64\wbem\WMIC.exe
              C:\Windows\System32\wbem\wmic.exe qfe get hotfixid
              4⤵
                PID:2044
              • C:\Windows\SysWOW64\findstr.exe
                C:\Windows\System32\findstr.exe "^KB3033929"
                4⤵
                  PID:1640
              • C:\Windows\SysWOW64\wusa.exe
                "C:\Windows\System32\wusa.exe" "C:\Users\Admin\AppData\Local\Temp\microsoft_win_patch_for_dsone1.msu" /quiet /norestart
                3⤵
                • Drops file in Windows directory
                PID:1896
              • C:\Windows\SysWOW64\cmd.exe
                cmd /Q /C "C:\Windows\System32\wbem\wmic.exe qfe get hotfixid | C:\Windows\System32\findstr.exe "^KB2506143""
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1224
                • C:\Windows\SysWOW64\wbem\WMIC.exe
                  C:\Windows\System32\wbem\wmic.exe qfe get hotfixid
                  4⤵
                    PID:1096
                  • C:\Windows\SysWOW64\findstr.exe
                    C:\Windows\System32\findstr.exe "^KB2506143"
                    4⤵
                      PID:1940

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\DSOne.exe

                      Filesize

                      85.7MB

                      MD5

                      76344565eb6cd55b74ff8c4fdb78dab9

                      SHA1

                      c70e882479cba007f9fb0fc69a1832e3d858157c

                      SHA256

                      10ef1b0d2c013a5d2dce020aa5d5dd255d1efabf5837e89ad7084ffa9e190085

                      SHA512

                      d2c571308ee6f955cc8ca1372ffb56eb4238c32ce4dbf147ddb239776fd571d6d72fd80ca4851b76ef09743a6c5de629463831ba2dd3d2bf7697afe6a77ed282

                    • C:\Users\Admin\AppData\Local\Temp\DSOne.exe

                      Filesize

                      85.7MB

                      MD5

                      76344565eb6cd55b74ff8c4fdb78dab9

                      SHA1

                      c70e882479cba007f9fb0fc69a1832e3d858157c

                      SHA256

                      10ef1b0d2c013a5d2dce020aa5d5dd255d1efabf5837e89ad7084ffa9e190085

                      SHA512

                      d2c571308ee6f955cc8ca1372ffb56eb4238c32ce4dbf147ddb239776fd571d6d72fd80ca4851b76ef09743a6c5de629463831ba2dd3d2bf7697afe6a77ed282

                    • C:\Users\Admin\AppData\Local\Temp\microsoft_win_patch_for_dsone1.msu

                      Filesize

                      43.8MB

                      MD5

                      87ff18974de76144206910d0d41a8ae5

                      SHA1

                      5c56222b0caf43030addc9ad262633fcbddfcd41

                      SHA256

                      5318587007edb6c8b29310ff18da479a162b486b9101a7de735f94a70dbc3b31

                      SHA512

                      10d9180affd860c26fa4022ab26e8640397f4006bbfd5ac4c50ac0ed9cb72a0e591a71ef071d2087893f3769e83f62f4d45674342653b7d44df421440b15a059

                    • C:\Users\Admin\AppData\Local\Temp\microsoft_win_patch_for_dsone1.msu

                      Filesize

                      8.4MB

                      MD5

                      c0fba2a4717cec30cb3528a32accf80d

                      SHA1

                      b2be3401133778ab70216e0992ddd608acdd3b18

                      SHA256

                      07944f76415ccaed19de2eed7fa01fe64ed2c4afc58f6ae4e96c93f031a2e4aa

                      SHA512

                      cf19930c74d71b0fefe77dd6ceef300fdeb55a73e66dc9c34fd0006bfd6717a6e09f086ca7cad8149e43fa423b7326ea45698ab4f538247141168d97ed27691a

                    • C:\Windows\Logs\DPX\setupact.log

                      Filesize

                      6KB

                      MD5

                      c3e883759144d7c7bd092bb5ed16829b

                      SHA1

                      a43e7f1e46f268409491f0a7a50620ed5684fb51

                      SHA256

                      307d1e8b1ef879e7c6714f0fdf71d521cebd4337fe8b4a186fa2a3efa9cc5a96

                      SHA512

                      e779d66f826fba300cc996cbee02b43e9105dfcc1d8b1a1b10c6b2e8bab37e80806c1b8b0d950b8a3815ab3e12c01aaf6eba8af848a3e84ae9f563c9b02cb67c

                    • C:\Windows\WindowsUpdate.log

                      Filesize

                      17KB

                      MD5

                      06547015d0267fcfc25f917545bad8f5

                      SHA1

                      4c8c1e70c7caeeb6b839794db5408cd04e198651

                      SHA256

                      83f6d96d647472f693e55864bf8dc6aa04ee15e15c529467ccf8af613e096f97

                      SHA512

                      53dc8a2013ed6386c17838ddc2ce3420883cd3b346051af2e7b33e229ff2e7bd029cecfa667794d5a776d1f275ac6b06e832528c9714d77f1b90a7bff2c95cd8

                    • \Users\Admin\AppData\Local\Temp\DSOne.exe

                      Filesize

                      85.7MB

                      MD5

                      76344565eb6cd55b74ff8c4fdb78dab9

                      SHA1

                      c70e882479cba007f9fb0fc69a1832e3d858157c

                      SHA256

                      10ef1b0d2c013a5d2dce020aa5d5dd255d1efabf5837e89ad7084ffa9e190085

                      SHA512

                      d2c571308ee6f955cc8ca1372ffb56eb4238c32ce4dbf147ddb239776fd571d6d72fd80ca4851b76ef09743a6c5de629463831ba2dd3d2bf7697afe6a77ed282

                    • \Users\Admin\AppData\Local\Temp\nsjEDCB.tmp\NScurl.dll

                      Filesize

                      3.6MB

                      MD5

                      16e134ec014d74e9b798c9b3fae3ddcc

                      SHA1

                      1a8cc259f7b193018167484c30d8803b09ed228e

                      SHA256

                      eda02e626e8ca71dbff5389c062f9e9542661b43413b0a37ae3d262567145ce2

                      SHA512

                      3e5742934076066125b82f4b2da45a499b22440252dff4ec14660fc688f075f886ac76de89f4c6647a8c85e483c83507edfcb22e3dbe3363e509ae18b1c4636e

                    • \Users\Admin\AppData\Local\Temp\nsjEDCB.tmp\System.dll

                      Filesize

                      11KB

                      MD5

                      55a26d7800446f1373056064c64c3ce8

                      SHA1

                      80256857e9a0a9c8897923b717f3435295a76002

                      SHA256

                      904fd5481d72f4e03b01a455f848dedd095d0fb17e33608e0d849f5196fb6ff8

                      SHA512

                      04b8ab7a85c26f188c0a06f524488d6f2ac2884bf107c860c82e94ae12c3859f825133d78338fd2b594dfc48f7dc9888ae76fee786c6252a5c77c88755128a5b

                    • \Users\Admin\AppData\Local\Temp\nsjEDCB.tmp\UserInfo.dll

                      Filesize

                      4KB

                      MD5

                      c051c86f6fa84ac87efb0cf3961950a1

                      SHA1

                      f18f4bb803099b80a3a013ecb03fea11cff0ac01

                      SHA256

                      d0949b4c0640ee6a80db5a7f6d93fc631ed194de197d79bf080ec1752c6f1166

                      SHA512

                      6e9de5d07aaed2ac297faa5049d567884d817ed94dece055d96913ac8e497ade6f0ff5c28bae7cc7d3ac41f8795efb9939e6d12061a3c446d5d2a3e2287d49d2

                    • \Users\Admin\AppData\Local\Temp\nsjEDCB.tmp\UserInfo.dll

                      Filesize

                      4KB

                      MD5

                      c051c86f6fa84ac87efb0cf3961950a1

                      SHA1

                      f18f4bb803099b80a3a013ecb03fea11cff0ac01

                      SHA256

                      d0949b4c0640ee6a80db5a7f6d93fc631ed194de197d79bf080ec1752c6f1166

                      SHA512

                      6e9de5d07aaed2ac297faa5049d567884d817ed94dece055d96913ac8e497ade6f0ff5c28bae7cc7d3ac41f8795efb9939e6d12061a3c446d5d2a3e2287d49d2

                    • \Users\Admin\AppData\Local\Temp\nsjEDCB.tmp\nsExec.dll

                      Filesize

                      6KB

                      MD5

                      b38561661a7164e3bbb04edc3718fe89

                      SHA1

                      f13c873c8db121ba21244b1e9a457204360d543f

                      SHA256

                      c2c88e4a32c734b0cb4ae507c1a9a1b417a2375079111fb1b35fab23aedd41d9

                      SHA512

                      fedcaac20722de3519382011ccf22314af3edcd11b69f814db14710966853b69b9b5fc98383edcdb64d050ff825264eaba27b1c5adfe61d1fc9d77f13a052ced

                    • \Users\Admin\AppData\Local\Temp\nsjEDCB.tmp\nsExec.dll

                      Filesize

                      6KB

                      MD5

                      b38561661a7164e3bbb04edc3718fe89

                      SHA1

                      f13c873c8db121ba21244b1e9a457204360d543f

                      SHA256

                      c2c88e4a32c734b0cb4ae507c1a9a1b417a2375079111fb1b35fab23aedd41d9

                      SHA512

                      fedcaac20722de3519382011ccf22314af3edcd11b69f814db14710966853b69b9b5fc98383edcdb64d050ff825264eaba27b1c5adfe61d1fc9d77f13a052ced

                    • \Users\Admin\AppData\Local\Temp\nsjEDCB.tmp\nsisdl.dll

                      Filesize

                      14KB

                      MD5

                      90f7c0f400fdc219ae149ede95c06cfd

                      SHA1

                      a39c3bc64c9dc68fbc44d729511b03ed4573e6aa

                      SHA256

                      5f9d4b41a10578f98e469466e55feb0141644842a4e246b2cbae6666cebd69a3

                      SHA512

                      f9e0476a4078c5435274cf2d8bf00e115e75b37ff3355388c040b1386b604090b85ef3170114d50958ec2f8bc8fab5d3b3ebda30d4c84a0e5d49138e60817272

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\DotNetChecker.dll

                      Filesize

                      83KB

                      MD5

                      e02ed575cffbc793af912c5541c7ffb3

                      SHA1

                      1fd8f5ed9417b3804c1fbd18340eba4d09326f60

                      SHA256

                      45e15d319084e019d4db5a3081533ba8c032308cf35384abf8b65ddbac6c5f9d

                      SHA512

                      76804c9df7f97dc50ff375d1f1d972f2d20b57e2c543986a47de61fc2a0ec87225bc22d69ef31a37a12ecec46e477595184a964587ef469d6b0698cd71ebb5f8

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\LangDLL.dll

                      Filesize

                      5KB

                      MD5

                      ea60c7bd5edd6048601729bd31362c16

                      SHA1

                      6e6919d969eb61a141595014395b6c3f44139073

                      SHA256

                      4e72c8b4d36f128b25281440e59e39af7ec2080d02e024f35ac413d769d91f39

                      SHA512

                      f9dc35220697153bb06e3a06caf645079881cb75aed008dbe5381ecaf3442d5be03500b36bbca8b3d114845fac3d667ddf4063c16bc35d29bbea862930939993

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\Linker.dll

                      Filesize

                      8KB

                      MD5

                      14b655f0567e2d13459a4c77b2641ad8

                      SHA1

                      16f073c74680f4ef8b6b477e86b75d8f136824c2

                      SHA256

                      d5684110f61200ac1142648f06a4df3ee30acf38b96538496c33cac69942c4cc

                      SHA512

                      f64ab83cbb87986d0356a7b9f0ebd0314d1341aecb6be627861b6a35df80d765cf85157293950eff82d44901f65068de177780a829c4d34f55a4f5089a0ddebe

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\NScurl.dll

                      Filesize

                      3.6MB

                      MD5

                      16e134ec014d74e9b798c9b3fae3ddcc

                      SHA1

                      1a8cc259f7b193018167484c30d8803b09ed228e

                      SHA256

                      eda02e626e8ca71dbff5389c062f9e9542661b43413b0a37ae3d262567145ce2

                      SHA512

                      3e5742934076066125b82f4b2da45a499b22440252dff4ec14660fc688f075f886ac76de89f4c6647a8c85e483c83507edfcb22e3dbe3363e509ae18b1c4636e

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\System.dll

                      Filesize

                      11KB

                      MD5

                      55a26d7800446f1373056064c64c3ce8

                      SHA1

                      80256857e9a0a9c8897923b717f3435295a76002

                      SHA256

                      904fd5481d72f4e03b01a455f848dedd095d0fb17e33608e0d849f5196fb6ff8

                      SHA512

                      04b8ab7a85c26f188c0a06f524488d6f2ac2884bf107c860c82e94ae12c3859f825133d78338fd2b594dfc48f7dc9888ae76fee786c6252a5c77c88755128a5b

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\UserInfo.dll

                      Filesize

                      4KB

                      MD5

                      c051c86f6fa84ac87efb0cf3961950a1

                      SHA1

                      f18f4bb803099b80a3a013ecb03fea11cff0ac01

                      SHA256

                      d0949b4c0640ee6a80db5a7f6d93fc631ed194de197d79bf080ec1752c6f1166

                      SHA512

                      6e9de5d07aaed2ac297faa5049d567884d817ed94dece055d96913ac8e497ade6f0ff5c28bae7cc7d3ac41f8795efb9939e6d12061a3c446d5d2a3e2287d49d2

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\UserInfo.dll

                      Filesize

                      4KB

                      MD5

                      c051c86f6fa84ac87efb0cf3961950a1

                      SHA1

                      f18f4bb803099b80a3a013ecb03fea11cff0ac01

                      SHA256

                      d0949b4c0640ee6a80db5a7f6d93fc631ed194de197d79bf080ec1752c6f1166

                      SHA512

                      6e9de5d07aaed2ac297faa5049d567884d817ed94dece055d96913ac8e497ade6f0ff5c28bae7cc7d3ac41f8795efb9939e6d12061a3c446d5d2a3e2287d49d2

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\nsDialogs.dll

                      Filesize

                      9KB

                      MD5

                      ee449b0adce56fbfa433b0239f3f81be

                      SHA1

                      ec1e4f9815ea592a3f19b1fe473329b8ddfa201c

                      SHA256

                      c1cc3aa4326e83a73a778dee0cf9afcc03a6bafb0a32cea791a27eb9c2288985

                      SHA512

                      22fb25bc7628946213e6e970a865d3fbd50d12ce559c37d6848a82c28fa6be09fedffc3b87d5aea8dcfe8dfc4e0f129d9f02e32dae764b8e6a08332b42386686

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\nsExec.dll

                      Filesize

                      6KB

                      MD5

                      b38561661a7164e3bbb04edc3718fe89

                      SHA1

                      f13c873c8db121ba21244b1e9a457204360d543f

                      SHA256

                      c2c88e4a32c734b0cb4ae507c1a9a1b417a2375079111fb1b35fab23aedd41d9

                      SHA512

                      fedcaac20722de3519382011ccf22314af3edcd11b69f814db14710966853b69b9b5fc98383edcdb64d050ff825264eaba27b1c5adfe61d1fc9d77f13a052ced

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\nsExec.dll

                      Filesize

                      6KB

                      MD5

                      b38561661a7164e3bbb04edc3718fe89

                      SHA1

                      f13c873c8db121ba21244b1e9a457204360d543f

                      SHA256

                      c2c88e4a32c734b0cb4ae507c1a9a1b417a2375079111fb1b35fab23aedd41d9

                      SHA512

                      fedcaac20722de3519382011ccf22314af3edcd11b69f814db14710966853b69b9b5fc98383edcdb64d050ff825264eaba27b1c5adfe61d1fc9d77f13a052ced

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\nsResize.dll

                      Filesize

                      4KB

                      MD5

                      aa849e7407cf349021812f62c001e097

                      SHA1

                      4cbb55b1d1dd95dcb7a36b5a44121ad4934539af

                      SHA256

                      29b0e5792679756a79d501e3a9b317971b08e876fac1c2476180d0ae83b77ba5

                      SHA512

                      4556baa49e8182d72e29e8d809635312142eb127039f5803ca0bf011b4359f0b584a670a3bd26a9969165a332cfa14a39abeaeae0b4d90519f91fdea755c54de

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\nsisdl.dll

                      Filesize

                      14KB

                      MD5

                      90f7c0f400fdc219ae149ede95c06cfd

                      SHA1

                      a39c3bc64c9dc68fbc44d729511b03ed4573e6aa

                      SHA256

                      5f9d4b41a10578f98e469466e55feb0141644842a4e246b2cbae6666cebd69a3

                      SHA512

                      f9e0476a4078c5435274cf2d8bf00e115e75b37ff3355388c040b1386b604090b85ef3170114d50958ec2f8bc8fab5d3b3ebda30d4c84a0e5d49138e60817272

                    • \Users\Admin\AppData\Local\Temp\nsy2742.tmp\nsisdl.dll

                      Filesize

                      14KB

                      MD5

                      90f7c0f400fdc219ae149ede95c06cfd

                      SHA1

                      a39c3bc64c9dc68fbc44d729511b03ed4573e6aa

                      SHA256

                      5f9d4b41a10578f98e469466e55feb0141644842a4e246b2cbae6666cebd69a3

                      SHA512

                      f9e0476a4078c5435274cf2d8bf00e115e75b37ff3355388c040b1386b604090b85ef3170114d50958ec2f8bc8fab5d3b3ebda30d4c84a0e5d49138e60817272

                    • memory/1252-62-0x0000000073EF0000-0x0000000073EF9000-memory.dmp

                      Filesize

                      36KB

                    • memory/1252-63-0x0000000073EF0000-0x0000000073EF9000-memory.dmp

                      Filesize

                      36KB

                    • memory/1252-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

                      Filesize

                      8KB