Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2023, 19:58

General

  • Target

    cd9688e971c4fc009ebbeb96836fe0e8f87d3d261d6a36bde22e0f5a1d9d263c.exe

  • Size

    3.6MB

  • MD5

    62ab7da4e4bc8bcd7a5e176e01e85ad3

  • SHA1

    6ba374f3c4cc4f8e9a597ff09d70da23c78b4e75

  • SHA256

    cd9688e971c4fc009ebbeb96836fe0e8f87d3d261d6a36bde22e0f5a1d9d263c

  • SHA512

    412528b566491d9ca007baf2b415612e954b68351bdebdc4579a3884a5c6320eecbbf76d23b8bdfba73bef4500f2021b772cf64b90a3a372acf240690b5e15a7

  • SSDEEP

    98304:h83k12Th27B1ryu2cDFMVBBo/OHxj7mP5G126x1PRKO:h8012I7B1rFrBqBoGHxORGxx9gO

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 23 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 26 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd9688e971c4fc009ebbeb96836fe0e8f87d3d261d6a36bde22e0f5a1d9d263c.exe
    "C:\Users\Admin\AppData\Local\Temp\cd9688e971c4fc009ebbeb96836fe0e8f87d3d261d6a36bde22e0f5a1d9d263c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll,start
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:3160
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 14164
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:3708
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:1076
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:4700
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 480
          2⤵
          • Program crash
          PID:4924
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 376 -ip 376
        1⤵
          PID:3580
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:2784
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k LocalService
            1⤵
              PID:1328
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windows nt\accessories\info.dll",hkRCUQ==
                2⤵
                  PID:2168

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Windows NT\Accessories\info.dll

                Filesize

                4.3MB

                MD5

                a1d904deca0acec58f9d3af275d2e085

                SHA1

                740d130bf1eb9052e9fb56d91b23129969c4d57c

                SHA256

                5328be051c38cd9e9fc900c9f86d1986718dc91741eb3ce5f1899e15ca97ce45

                SHA512

                145086db777c1b6edf70c81eb99f9cbda4a55a876ac231c5de517ba3a5cf1bf4ce271954be5d1e5bd1f5c99e6c99fe5c870615c083f978fb265b753f3cc4326c

              • C:\Program Files (x86)\Windows NT\Accessories\info.dll

                Filesize

                4.3MB

                MD5

                a1d904deca0acec58f9d3af275d2e085

                SHA1

                740d130bf1eb9052e9fb56d91b23129969c4d57c

                SHA256

                5328be051c38cd9e9fc900c9f86d1986718dc91741eb3ce5f1899e15ca97ce45

                SHA512

                145086db777c1b6edf70c81eb99f9cbda4a55a876ac231c5de517ba3a5cf1bf4ce271954be5d1e5bd1f5c99e6c99fe5c870615c083f978fb265b753f3cc4326c

              • C:\Program Files (x86)\Windows NT\Accessories\info.dll

                Filesize

                3.5MB

                MD5

                f4ccad88f00edb180aceef308a141493

                SHA1

                5ed376b73b2da0da1c24f27bda5c62dea90418f7

                SHA256

                c9da4d5cfe94b3fd21dcda3af4f66cc3f4eaee5f397b9fc3c4601a227042e45e

                SHA512

                d68a486bef7baaa920c59e6ca984af247a85bde3f174a5cbd6679ebfcdd9ff0517ca6ee329e8ef866afc7c92bf5310e8bdc93a7a5481d4dfa42e1d918e021604

              • C:\Program Files (x86)\Windows NT\Accessories\info.dll

                Filesize

                3.6MB

                MD5

                153f6ea77a5d7a1b2a379bdcfd41ec5a

                SHA1

                5729361eeb31be9adb22e4b410a6a23b44333930

                SHA256

                7a98482250704e37c613c1584d93393d265d474a790a3fa99fcee8c92e3f5bbb

                SHA512

                a4e1f6f7583fd8589ad56b52bee296170f2cb8b148199b42ae9e0d2b5ee385964cd3e182d67bb3ad531a058234123549957d36def30ab33c5e99a9eaf84f6504

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\C2RManifest.office32mui.msi.16.en-us.xml

                Filesize

                16KB

                MD5

                ada34b241139f06addc86a9e8d1108f0

                SHA1

                909a92a4e970ae4edcfc365a119d4f4410b0bcf6

                SHA256

                3069814db0a03ed2ce383cb97739d07545d3b67a2b532d9c07d0d5aa3c6a4f3a

                SHA512

                2797c6087798660773cfa65f002a4232d75c8b8f787deb12364af683653b41de411ca2de54be1aa86356ba3b6203775c9afaedd513ad33c26f273047f87537a0

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\CiST0000.001

                Filesize

                64KB

                MD5

                efca15e60890fe74b53b0c415cf8fc68

                SHA1

                f8d3d29a242101a144f9b6ea4923af3556f5774b

                SHA256

                c4b27062149c30ffc466027919cc6881c6d25c00a8bcb8ec9bc0a570b8b3dab6

                SHA512

                5d58a06f6d97d092c6b7811318a9182190d6ce397bb473ade6e8747592dccdd8e406dd7bc54591f670e004e1a55d7c6687222c5773172d6dadc5e82dfc18d128

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\DeploymentConfig.2.xml

                Filesize

                1KB

                MD5

                3793544370ec1fddcf5ba6ae099f2538

                SHA1

                c784c5d8d1c496ab7ba1150782d20cba67b76321

                SHA256

                87975551187040cc2505a12ac285c042b8e70921a55808ecf982c7cd37df0ae2

                SHA512

                debdde56e6e087ff04863490223229d37828e348f7630d6c33aae1f113cce4be75f1420c593268ef5f5bd3026dccb062015781ba83dcaffa2b9bb37b55efc319

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\DiagnosticLogCSP_Collector_DeviceProvisioning_2022_11_11_13_34_59.etl

                Filesize

                256KB

                MD5

                5675b48ebe68863142b57987480ac016

                SHA1

                90896d0b8e69056a2930c158caf94e6cd00015d9

                SHA256

                ae86f0e58ca7e5f9792931cc6e97b93f708202b27b43463bbadb63e32b8cd4ae

                SHA512

                727aa454033ad99dcddb2e5a6c7b611bfbfa31df4a45fb35af174c7c0d00774fe33694e7711c99f987ea86e6ba0d7912565bfaad207fb963efe0d03fef1847aa

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\Microsoft.BingWeather_4.25.20211.0_neutral_~_8wekyb3d8bbwe.xml

                Filesize

                29KB

                MD5

                0edf0ff4a8a9986d080992dd07e8a177

                SHA1

                bd58bb41baf5418a8ffaa8f75fb8fe412cf012a8

                SHA256

                7117f778c590d79b5a434edaa09448f23332d1db26676db2c9463b0d2c2ddfb6

                SHA512

                faa4c4fe982301ba2f5f2e239889c964bdb9f70b3939516e480987067a2b6482f6803bc06a514e6aac407be1306534b216dc2a801027722e985d1a2f41c01704

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\Microsoft.DesktopAppInstaller_2019.125.2243.0_neutral_~_8wekyb3d8bbwe.xml

                Filesize

                26KB

                MD5

                2bc8ee174a90308d275eda81bf42d95e

                SHA1

                284647d3ee515e4794d1984d2f01989f33121d2d

                SHA256

                d8bd4c83debd08b1a21d24b3c4a445512ef1931717c01e113fbfc20f47157ea8

                SHA512

                fe5d552cbfea372817d64c69f22cbf1a02d1b7ef27ef4a0acf68247a2794f58d09b0147ef110a0267bda87c6712ba18dc261a8c9c7e3ed4c1352bb324ed42327

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-125_8wekyb3d8bbwe.xml

                Filesize

                913B

                MD5

                be48ed7a27efec1cfe2fff47cd7487cf

                SHA1

                ac37f431251640b5dbe93fc68d97265a22cb68ba

                SHA256

                49300e653a9546101b9d906d9782250976b92aaa7f6d92b561f130d5ac6c856f

                SHA512

                4e86e8ac7a21465ef728d6f0c4949394d0145e119886b152b27bce6be4108e784e4f6224937f064741f0dfcdc4d9f9bec6933c30e0b5225a7458154316cd14cb

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe.xml

                Filesize

                839B

                MD5

                5ddffd275e173019cb301fe2c96a2f3f

                SHA1

                0303cebf14f4304d93733426aee485e4bf7efe29

                SHA256

                d1e768a7bb7a5851697a2a5bec63670c9d90b72d1f77169ef231c265b9cb8272

                SHA512

                e92f31f56dc2f5dfa0963978239303d2c5755b5bfa363910f18e5168703d3ddfc506ad522915b90f9d489997a66a3db780762e750a658ac7835b75d8d299684a

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\Tidoidqiiqf.tmp

                Filesize

                3.5MB

                MD5

                734feae147179ed2cba35e524ea6b448

                SHA1

                7079efc2037ea49d20b2a4e59737b797e6cc327b

                SHA256

                931f808a1b90ad47f4d210cf6de10cb4ed1f9bf842d2fd814f7188ab8fc57c7d

                SHA512

                8f70e3235cad434c3afd1dffca8d61466e63574ab03d183ed3ef356fda5bf7ff3867ffbd9f5d35d0cdbe41ac84f8e4ee6fe7e9aa1fd8379006b126f94bb259c8

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\Tidoidqiiqf.tmp

                Filesize

                3.5MB

                MD5

                734feae147179ed2cba35e524ea6b448

                SHA1

                7079efc2037ea49d20b2a4e59737b797e6cc327b

                SHA256

                931f808a1b90ad47f4d210cf6de10cb4ed1f9bf842d2fd814f7188ab8fc57c7d

                SHA512

                8f70e3235cad434c3afd1dffca8d61466e63574ab03d183ed3ef356fda5bf7ff3867ffbd9f5d35d0cdbe41ac84f8e4ee6fe7e9aa1fd8379006b126f94bb259c8

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\print_pref.ico

                Filesize

                56KB

                MD5

                a52a082f2b18811deaf3138d27c57af8

                SHA1

                317bf685e50de705818bff26f032e7f593830509

                SHA256

                6b4b668a30271d7853257b5752dc429b39c7b264e77ff3533196e6fd03fbeb88

                SHA512

                0d6f4bbb993b4e9a0069ddd0503ceb45d8a1cc6f6453cc2faf91cb137fa49e15eeaa3d77cb9954cc07701153932da51977d467c54b1e0fcfe74b6670cac47d99

              • C:\ProgramData\{3A0AC630-6EFD-8E66-E7F7-7E12947FB789}\utc.privacy.json

                Filesize

                31B

                MD5

                4870433b19757ef8721b38acf2baa272

                SHA1

                d9def40343d41a6a80e936fc12db58ebb3e3fdb8

                SHA256

                cf39cf82fe54738a64f566a0f947ddabf90b7af56a899596fb34dca2a67ddfbc

                SHA512

                79c72e2c4d8a8538879f11c09877f78ea363ee28f70da66cae50a3372e600a1939372945dc4542a5ee649c18adb5e7d1129fc97635d48c165737193f8b682550

              • C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll

                Filesize

                4.3MB

                MD5

                5b6dafa9634b2b3befec4b8541a200ba

                SHA1

                1565a6ee4b3ec28af60949e84017cbafb7c0dea4

                SHA256

                2ad336b3ccc9c25735e1a1c83fb183021ec4dd159032a3dad3c279656a86fe76

                SHA512

                3c82af0505cd7466ef74c58685362c50302df94d8c0e859af2f44cc61d7488f3d5dd9122d751dc3a0d237ddf381e69e4f9be87776ef6f6a2a7cc000dbf78f207

              • C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll

                Filesize

                4.3MB

                MD5

                5b6dafa9634b2b3befec4b8541a200ba

                SHA1

                1565a6ee4b3ec28af60949e84017cbafb7c0dea4

                SHA256

                2ad336b3ccc9c25735e1a1c83fb183021ec4dd159032a3dad3c279656a86fe76

                SHA512

                3c82af0505cd7466ef74c58685362c50302df94d8c0e859af2f44cc61d7488f3d5dd9122d751dc3a0d237ddf381e69e4f9be87776ef6f6a2a7cc000dbf78f207

              • C:\Users\Admin\AppData\Local\Temp\Ruifriwreh.dll

                Filesize

                4.3MB

                MD5

                5b6dafa9634b2b3befec4b8541a200ba

                SHA1

                1565a6ee4b3ec28af60949e84017cbafb7c0dea4

                SHA256

                2ad336b3ccc9c25735e1a1c83fb183021ec4dd159032a3dad3c279656a86fe76

                SHA512

                3c82af0505cd7466ef74c58685362c50302df94d8c0e859af2f44cc61d7488f3d5dd9122d751dc3a0d237ddf381e69e4f9be87776ef6f6a2a7cc000dbf78f207

              • \??\c:\program files (x86)\windows nt\accessories\info.dll

                Filesize

                4.3MB

                MD5

                a1d904deca0acec58f9d3af275d2e085

                SHA1

                740d130bf1eb9052e9fb56d91b23129969c4d57c

                SHA256

                5328be051c38cd9e9fc900c9f86d1986718dc91741eb3ce5f1899e15ca97ce45

                SHA512

                145086db777c1b6edf70c81eb99f9cbda4a55a876ac231c5de517ba3a5cf1bf4ce271954be5d1e5bd1f5c99e6c99fe5c870615c083f978fb265b753f3cc4326c

              • memory/376-136-0x0000000000400000-0x00000000008F6000-memory.dmp

                Filesize

                5.0MB

              • memory/376-132-0x000000000280B000-0x0000000002B93000-memory.dmp

                Filesize

                3.5MB

              • memory/376-142-0x0000000000400000-0x00000000008F6000-memory.dmp

                Filesize

                5.0MB

              • memory/376-135-0x0000000002BA0000-0x000000000308A000-memory.dmp

                Filesize

                4.9MB

              • memory/376-134-0x0000000000400000-0x00000000008F6000-memory.dmp

                Filesize

                5.0MB

              • memory/376-133-0x0000000002BA0000-0x000000000308A000-memory.dmp

                Filesize

                4.9MB

              • memory/1328-179-0x0000000002C40000-0x000000000378D000-memory.dmp

                Filesize

                11.3MB

              • memory/1328-175-0x0000000002C40000-0x000000000378D000-memory.dmp

                Filesize

                11.3MB

              • memory/1328-176-0x0000000002C40000-0x000000000378D000-memory.dmp

                Filesize

                11.3MB

              • memory/1328-163-0x0000000002100000-0x0000000002555000-memory.dmp

                Filesize

                4.3MB

              • memory/2168-182-0x00000000025C0000-0x0000000002A15000-memory.dmp

                Filesize

                4.3MB

              • memory/3160-144-0x0000000004330000-0x0000000004E7D000-memory.dmp

                Filesize

                11.3MB

              • memory/3160-146-0x0000000004F40000-0x0000000005080000-memory.dmp

                Filesize

                1.2MB

              • memory/3160-141-0x0000000002D80000-0x00000000031D5000-memory.dmp

                Filesize

                4.3MB

              • memory/3160-143-0x0000000004330000-0x0000000004E7D000-memory.dmp

                Filesize

                11.3MB

              • memory/3160-145-0x0000000004330000-0x0000000004E7D000-memory.dmp

                Filesize

                11.3MB

              • memory/3160-159-0x0000000004330000-0x0000000004E7D000-memory.dmp

                Filesize

                11.3MB

              • memory/3160-147-0x0000000004F40000-0x0000000005080000-memory.dmp

                Filesize

                1.2MB

              • memory/3160-151-0x0000000004F40000-0x0000000005080000-memory.dmp

                Filesize

                1.2MB

              • memory/3160-150-0x0000000004F40000-0x0000000005080000-memory.dmp

                Filesize

                1.2MB

              • memory/3160-149-0x0000000004F40000-0x0000000005080000-memory.dmp

                Filesize

                1.2MB

              • memory/3160-148-0x0000000004F40000-0x0000000005080000-memory.dmp

                Filesize

                1.2MB

              • memory/3708-153-0x000001C80EC70000-0x000001C80EDB0000-memory.dmp

                Filesize

                1.2MB

              • memory/3708-154-0x000001C80EC70000-0x000001C80EDB0000-memory.dmp

                Filesize

                1.2MB

              • memory/3708-155-0x0000000000F70000-0x0000000001207000-memory.dmp

                Filesize

                2.6MB

              • memory/3708-156-0x000001C80D220000-0x000001C80D4C9000-memory.dmp

                Filesize

                2.7MB