Overview
overview
7Static
static
1infinst.exe
windows10-1703-x64
4infinst.exe
windows10-2004-x64
4x3daudio1_1.dll
windows10-1703-x64
1x3daudio1_1.dll
windows10-2004-x64
3xactengine2_7.dll
windows10-1703-x64
7xactengine2_7.dll
windows10-2004-x64
7AutoPlay/D...UP.dll
windows10-1703-x64
4AutoPlay/D...UP.dll
windows10-2004-x64
4AutoPlay/D...UP.exe
windows10-1703-x64
4AutoPlay/D...UP.exe
windows10-2004-x64
4AutoPlay/D...S.pptx
windows10-1703-x64
1AutoPlay/D...S.pptx
windows10-2004-x64
1AutoPlay/D...er.exe
windows10-1703-x64
7AutoPlay/D...er.exe
windows10-2004-x64
7AutoPlay/D...32.dll
windows10-1703-x64
4AutoPlay/D...32.dll
windows10-2004-x64
4AutoPlay/D...up.exe
windows10-1703-x64
7AutoPlay/D...up.exe
windows10-2004-x64
7autorun.exe
windows10-1703-x64
3autorun.exe
windows10-2004-x64
3lua5.1.dll
windows10-1703-x64
3lua5.1.dll
windows10-2004-x64
3lua51.dll
windows10-1703-x64
3lua51.dll
windows10-2004-x64
3Analysis
-
max time kernel
1425s -
max time network
1235s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-es -
resource tags
arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
15-02-2023 04:45
Static task
static1
Behavioral task
behavioral1
Sample
infinst.exe
Resource
win10-20220812-es
Behavioral task
behavioral2
Sample
infinst.exe
Resource
win10v2004-20220812-es
Behavioral task
behavioral3
Sample
x3daudio1_1.dll
Resource
win10-20220901-es
Behavioral task
behavioral4
Sample
x3daudio1_1.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral5
Sample
xactengine2_7.dll
Resource
win10-20220812-es
Behavioral task
behavioral6
Sample
xactengine2_7.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral7
Sample
AutoPlay/Docs/DSETUP.dll
Resource
win10-20220812-es
Behavioral task
behavioral8
Sample
AutoPlay/Docs/DSETUP.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral9
Sample
AutoPlay/Docs/DXSETUP.exe
Resource
win10-20220901-es
Behavioral task
behavioral10
Sample
AutoPlay/Docs/DXSETUP.exe
Resource
win10v2004-20220812-es
Behavioral task
behavioral11
Sample
AutoPlay/Docs/DirectX_11_Technology_Update_US.pptx
Resource
win10-20220812-es
Behavioral task
behavioral12
Sample
AutoPlay/Docs/DirectX_11_Technology_Update_US.pptx
Resource
win10v2004-20221111-es
Behavioral task
behavioral13
Sample
AutoPlay/Docs/VC_RedistInstaller.exe
Resource
win10-20220901-es
Behavioral task
behavioral14
Sample
AutoPlay/Docs/VC_RedistInstaller.exe
Resource
win10v2004-20221111-es
Behavioral task
behavioral15
Sample
AutoPlay/Docs/dsetup32.dll
Resource
win10-20220812-es
Behavioral task
behavioral16
Sample
AutoPlay/Docs/dsetup32.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral17
Sample
AutoPlay/Docs/setup.exe
Resource
win10-20220812-es
Behavioral task
behavioral18
Sample
AutoPlay/Docs/setup.exe
Resource
win10v2004-20221111-es
Behavioral task
behavioral19
Sample
autorun.exe
Resource
win10-20220812-es
Behavioral task
behavioral20
Sample
autorun.exe
Resource
win10v2004-20221111-es
Behavioral task
behavioral21
Sample
lua5.1.dll
Resource
win10-20220901-es
Behavioral task
behavioral22
Sample
lua5.1.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral23
Sample
lua51.dll
Resource
win10-20220812-es
Behavioral task
behavioral24
Sample
lua51.dll
Resource
win10v2004-20220812-es
General
-
Target
AutoPlay/Docs/dsetup32.dll
-
Size
1.5MB
-
MD5
d8fa7bb4fe10251a239ed75055dd6f73
-
SHA1
76c4bd2d8f359f7689415efc15e3743d35673ae8
-
SHA256
fb0e534f9b0926e518f1c2980640dfd29f14217cdfa37cf3a0c13349127ed9a8
-
SHA512
73f633179b1340c1c14d0002b72e44cab1919d0ef174f307e4bfe6de240b0b6ef233e67a8b0a0cd677556865ee7b88c6de152045a580ab9fbf1a50d2db0673b4
-
SSDEEP
24576:CIQ+ddddddddddddddxOOOOOOOOOOOOOO2iWeXiWeXiWeXiWeXiWeXiWeXiWeXi+:CIQsOOOOOOOOOOOOOO2iWeXiWeXiWeXf
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DXError.log rundll32.exe File opened for modification C:\Windows\Logs\DirectX.log rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 0000000004000000106161d2e731958f0000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff000000002701010000080000106161d20000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3f000000ffffffff000000000700010000680900106161d2000000000000d0120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000106161d200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000106161d200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeBackupPrivilege 4340 vssvc.exe Token: SeRestorePrivilege 4340 vssvc.exe Token: SeAuditPrivilege 4340 vssvc.exe Token: SeBackupPrivilege 4640 srtasks.exe Token: SeRestorePrivilege 4640 srtasks.exe Token: SeSecurityPrivilege 4640 srtasks.exe Token: SeTakeOwnershipPrivilege 4640 srtasks.exe Token: SeBackupPrivilege 4640 srtasks.exe Token: SeRestorePrivilege 4640 srtasks.exe Token: SeSecurityPrivilege 4640 srtasks.exe Token: SeTakeOwnershipPrivilege 4640 srtasks.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2576 wrote to memory of 3700 2576 rundll32.exe 56 PID 2576 wrote to memory of 3700 2576 rundll32.exe 56 PID 2576 wrote to memory of 3700 2576 rundll32.exe 56
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AutoPlay\Docs\dsetup32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AutoPlay\Docs\dsetup32.dll,#12⤵
- Drops file in Windows directory
PID:3700
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:4640