Analysis

  • max time kernel
    150s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2023 02:45

General

  • Target

    CellebriteReader.exe

  • Size

    521.2MB

  • MD5

    4ee6c8c467042231f679373b235a3277

  • SHA1

    473b6be91286e95af2c5f4dc020fb0a0cfb8a64e

  • SHA256

    bb7a3834b1e8f94560df24fbfc744f8fc6771f40eb5cb66bd5844134c4838944

  • SHA512

    ca0a8356109a86b1dbea3d57ba642f88f979e34400dca37f9002e7501808bc0400dcb135eef8118ae573a6a99eb8f3501cc8eba88924ea13bfffdaad38321135

  • SSDEEP

    6291456:merX4TNsSd5LTgMFz2KJbTbOA2yeCpc8xFs5:mu4iSvTysZPe2xs

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 33 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CellebriteReader.exe
    "C:\Users\Admin\AppData\Local\Temp\CellebriteReader.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4740

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CefSharp.dll
    Filesize

    221KB

    MD5

    87e6a6b7cf19961bb608b4ea2b02e66b

    SHA1

    bd84586d4c1277cf2be91e9d8212b22a612cb0a8

    SHA256

    9c2dd6803e0a02a2ded6f0b0fd1a2e509aec49a03fa33af6a02763e4d35e0c31

    SHA512

    58491a89096fa25aae0814f41938664d156fe2479827f09145b9f2d62ee39b8fb8bec4e6193608b1cc5eebe5995f4f6b049005770769d3795ce005425f192fa0

  • C:\Users\Admin\AppData\Local\Temp\CefSharp.dll
    Filesize

    221KB

    MD5

    87e6a6b7cf19961bb608b4ea2b02e66b

    SHA1

    bd84586d4c1277cf2be91e9d8212b22a612cb0a8

    SHA256

    9c2dd6803e0a02a2ded6f0b0fd1a2e509aec49a03fa33af6a02763e4d35e0c31

    SHA512

    58491a89096fa25aae0814f41938664d156fe2479827f09145b9f2d62ee39b8fb8bec4e6193608b1cc5eebe5995f4f6b049005770769d3795ce005425f192fa0

  • C:\Users\Admin\AppData\Local\Temp\CommonERM.dll
    Filesize

    485KB

    MD5

    7430bf25a02a37330b1c8515f09dc6d7

    SHA1

    b4b01fbaa30ac69079b278879890776d7dc406dc

    SHA256

    3afeee07cafb768c249e2d7ae84c7e5cc2fee096e0be6a8754693aedea972829

    SHA512

    6084012fd2b650e863951f8edd0a603debb4e50ba1b8fe44ac3459b56f6e445813b354f3568c0a8851f9df19d3b8b19b5ab06a903b1a4356ba7a9ffd81e923f0

  • C:\Users\Admin\AppData\Local\Temp\CommonERM.dll
    Filesize

    485KB

    MD5

    7430bf25a02a37330b1c8515f09dc6d7

    SHA1

    b4b01fbaa30ac69079b278879890776d7dc406dc

    SHA256

    3afeee07cafb768c249e2d7ae84c7e5cc2fee096e0be6a8754693aedea972829

    SHA512

    6084012fd2b650e863951f8edd0a603debb4e50ba1b8fe44ac3459b56f6e445813b354f3568c0a8851f9df19d3b8b19b5ab06a903b1a4356ba7a9ffd81e923f0

  • C:\Users\Admin\AppData\Local\Temp\CommonERM.dll
    Filesize

    485KB

    MD5

    7430bf25a02a37330b1c8515f09dc6d7

    SHA1

    b4b01fbaa30ac69079b278879890776d7dc406dc

    SHA256

    3afeee07cafb768c249e2d7ae84c7e5cc2fee096e0be6a8754693aedea972829

    SHA512

    6084012fd2b650e863951f8edd0a603debb4e50ba1b8fe44ac3459b56f6e445813b354f3568c0a8851f9df19d3b8b19b5ab06a903b1a4356ba7a9ffd81e923f0

  • C:\Users\Admin\AppData\Local\Temp\CommonERM.dll
    Filesize

    485KB

    MD5

    7430bf25a02a37330b1c8515f09dc6d7

    SHA1

    b4b01fbaa30ac69079b278879890776d7dc406dc

    SHA256

    3afeee07cafb768c249e2d7ae84c7e5cc2fee096e0be6a8754693aedea972829

    SHA512

    6084012fd2b650e863951f8edd0a603debb4e50ba1b8fe44ac3459b56f6e445813b354f3568c0a8851f9df19d3b8b19b5ab06a903b1a4356ba7a9ffd81e923f0

  • C:\Users\Admin\AppData\Local\Temp\CommonERM.dll
    Filesize

    485KB

    MD5

    7430bf25a02a37330b1c8515f09dc6d7

    SHA1

    b4b01fbaa30ac69079b278879890776d7dc406dc

    SHA256

    3afeee07cafb768c249e2d7ae84c7e5cc2fee096e0be6a8754693aedea972829

    SHA512

    6084012fd2b650e863951f8edd0a603debb4e50ba1b8fe44ac3459b56f6e445813b354f3568c0a8851f9df19d3b8b19b5ab06a903b1a4356ba7a9ffd81e923f0

  • C:\Users\Admin\AppData\Local\Temp\System.Data.SQLite.dll
    Filesize

    288KB

    MD5

    b3ecb7645717e4e0b3daaacbedc7962d

    SHA1

    6f4fa9e4dd4d15cda757c527921248ad6f914ad2

    SHA256

    75551655a7473aa582e64dca59d2ae97fa2ba0293b05a0bbc69be001621f32d9

    SHA512

    5dab84eb7fbe8c3cd30ac67b987c8cad98e9145435bb72957ff1744ba0e09947a34d24e3133209d8f9332a552cc43a950d05a099cc00efdce530ca9dd5b3395c

  • C:\Users\Admin\AppData\Local\Temp\System.Data.SQLite.dll
    Filesize

    288KB

    MD5

    b3ecb7645717e4e0b3daaacbedc7962d

    SHA1

    6f4fa9e4dd4d15cda757c527921248ad6f914ad2

    SHA256

    75551655a7473aa582e64dca59d2ae97fa2ba0293b05a0bbc69be001621f32d9

    SHA512

    5dab84eb7fbe8c3cd30ac67b987c8cad98e9145435bb72957ff1744ba0e09947a34d24e3133209d8f9332a552cc43a950d05a099cc00efdce530ca9dd5b3395c

  • C:\Users\Admin\AppData\Local\Temp\libeay32.dll
    Filesize

    2.2MB

    MD5

    54c61976fa3e68a06ae171e6de256003

    SHA1

    c4949c398e9b5a878634d07c19b92c2ee557241a

    SHA256

    d98bb0a0bcbb5332c4ed1fc2d11b2d5b456a3e863890e5476e0adda9fd2310f0

    SHA512

    9eaca66467e85875a09f8a478337b7a9f116c26034ea89030790dea4ce844fc5c96c8637b66c977366313c8a783afb37e367c35168f94b6e75d0dba9f30743d9

  • C:\Users\Admin\AppData\Local\Temp\msvcp140.dll
    Filesize

    618KB

    MD5

    9ff712c25312821b8aec84c4f8782a34

    SHA1

    1a7a250d92a59c3af72a9573cffec2fcfa525f33

    SHA256

    517cd3aac2177a357cca6032f07ad7360ee8ca212a02dd6e1301bf6cfade2094

    SHA512

    5a65da337e64ea42bcc461b411ae622ce4dec1036638b1e5de4757b366875d7f13c1290f2ee345f358994f648c5941db35aa5d2313f547605508fd2bcc047e33

  • C:\Users\Admin\AppData\Local\Temp\sqlite3.dll
    Filesize

    1.2MB

    MD5

    28ab35ca1a3804109f43177552446c46

    SHA1

    dc4aea6bf488f61d09f195fc99b1128c270dce4a

    SHA256

    65428cf68340ebc65c399a4e8ae082ac51d31d9476180d94e8fa71d729ffdefa

    SHA512

    741bddff0de1a6484ac34e547cd1127597899ff893f73beeb9a15c5ec989a48bae8526f88df9af7cd7d1ba141e86278a0a7b32c3835b8d50d2ea9bc8a7a0499e

  • C:\Users\Admin\AppData\Local\Temp\vcruntime140.dll
    Filesize

    85KB

    MD5

    edf9d5c18111d82cf10ec99f6afa6b47

    SHA1

    d247f5b9d4d3061e3d421e0e623595aa40d9493c

    SHA256

    d89c7b863fc1ac3a179d45d5fe1b9fd35fb6fbd45171ca68d0d68ab1c1ad04fb

    SHA512

    bf017aa8275c5b6d064984a606c5d40852aa70047759468395fe520f7f68b5452befc3145efaa7c51f8ec3bf71d9e32dbd5633637f040d58ff9a4b6953bf1cbf

  • C:\Users\Admin\AppData\Roaming\Cellebrite Mobile Synchronization\UFED Physical Analyzer\b0a2ce81acad647240996dc498dca521\settings.s3db
    Filesize

    12KB

    MD5

    4fb960669a8d1a88f294bbc12c3cf4fe

    SHA1

    ad06ca540febf211aa53a7021e1d4ccb536f9af4

    SHA256

    8320325ffa544029a60b86dd843b4c280ba6dd8278e685bdc394bcd2e2d5d8a6

    SHA512

    14505ac6838e2b8eabaeac4ea6890f127e47bb36eac15032fb883ae4afa2ad3157f6eb2ff294d070ca78b3782008361d2e866259313a4693df9ec4ea30610f7e

  • C:\Users\Admin\AppData\Roaming\Cellebrite Mobile Synchronization\UFED Physical Analyzer\b0a2ce81acad647240996dc498dca521\settings.s3db
    Filesize

    15KB

    MD5

    5e83b0b3c4ed98d697c5670c933eaa35

    SHA1

    7779b3bae967e06ed49eb413f501d219969173ce

    SHA256

    415bb48f3227de30fdfcefdeabfc523dfc7f0f39eb5f29de913dca69592bbc93

    SHA512

    0d7049b25cdac8b34877a71963f4943f1f612807078772f0ec1673b17b6369115e7257d628e9d252734deb27e4f2f972f2be9acb3b561f1a7a182dc3fc946f1c

  • C:\Users\Admin\AppData\Roaming\Cellebrite Mobile Synchronization\UFED Physical Analyzer\b0a2ce81acad647240996dc498dca521\settings.s3db
    Filesize

    22KB

    MD5

    de83e9edfc9a83478d66d7f8e50affb4

    SHA1

    4d47a12c6dd2cdd79629e37bbec7227523fef263

    SHA256

    57e9a12b687749145e7e0669534e0fa9c15f9cb77e6657011ae8c41ace248b3f

    SHA512

    7f4014309260b5d66a0f4d42f8ab9022d58b78decc3217d1287a6eb9148f258d7b47da2fb03085551bf1b648b2a48d941a7e3983d960dc01f9d07297a6773eac

  • memory/4740-250-0x000002B7B8EC0000-0x000002B7B8ED0000-memory.dmp
    Filesize

    64KB

  • memory/4740-136-0x000002B7B8EC0000-0x000002B7B8ED0000-memory.dmp
    Filesize

    64KB

  • memory/4740-184-0x000002B7DA3F0000-0x000002B7DA3FE000-memory.dmp
    Filesize

    56KB

  • memory/4740-276-0x000002B7E77F0000-0x000002B7E780C000-memory.dmp
    Filesize

    112KB

  • memory/4740-182-0x000002B7B8EC0000-0x000002B7B8ED0000-memory.dmp
    Filesize

    64KB

  • memory/4740-212-0x000002B7E4B60000-0x000002B7E4BAC000-memory.dmp
    Filesize

    304KB

  • memory/4740-181-0x000002B7B8EC0000-0x000002B7B8ED0000-memory.dmp
    Filesize

    64KB

  • memory/4740-134-0x000002B7B8EF0000-0x000002B7B8F0A000-memory.dmp
    Filesize

    104KB

  • memory/4740-135-0x000002B7BA910000-0x000002B7BA95A000-memory.dmp
    Filesize

    296KB

  • memory/4740-216-0x000002B7E4BB0000-0x000002B7E4BEA000-memory.dmp
    Filesize

    232KB

  • memory/4740-222-0x000002B7E7850000-0x000002B7E7D78000-memory.dmp
    Filesize

    5.2MB

  • memory/4740-223-0x000002B7E4C40000-0x000002B7E4C52000-memory.dmp
    Filesize

    72KB

  • memory/4740-224-0x000002B7E4CA0000-0x000002B7E4CDC000-memory.dmp
    Filesize

    240KB

  • memory/4740-305-0x000002B7B8EC0000-0x000002B7B8ED0000-memory.dmp
    Filesize

    64KB

  • memory/4740-247-0x000002B7B8EC0000-0x000002B7B8ED0000-memory.dmp
    Filesize

    64KB

  • memory/4740-190-0x000002B7E4250000-0x000002B7E4258000-memory.dmp
    Filesize

    32KB

  • memory/4740-183-0x000002B7DA420000-0x000002B7DA458000-memory.dmp
    Filesize

    224KB

  • memory/4740-185-0x000002B7B8EC0000-0x000002B7B8ED0000-memory.dmp
    Filesize

    64KB

  • memory/4740-239-0x000002B7E4D30000-0x000002B7E4D52000-memory.dmp
    Filesize

    136KB

  • memory/4740-316-0x000002B7EFF80000-0x000002B7F008A000-memory.dmp
    Filesize

    1.0MB

  • memory/4740-133-0x000002B7981E0000-0x000002B7991E0000-memory.dmp
    Filesize

    16.0MB

  • memory/4740-901-0x000002B7ED100000-0x000002B7ED140000-memory.dmp
    Filesize

    256KB

  • memory/4740-903-0x000002B7ECF30000-0x000002B7ECF38000-memory.dmp
    Filesize

    32KB

  • memory/4740-908-0x000002B7ED000000-0x000002B7ED008000-memory.dmp
    Filesize

    32KB

  • memory/4740-910-0x000002B7ED1A0000-0x000002B7ED1A8000-memory.dmp
    Filesize

    32KB

  • memory/4740-909-0x000002B7EFE70000-0x000002B7EFEEC000-memory.dmp
    Filesize

    496KB

  • memory/4740-911-0x000002B7DA2B0000-0x000002B7DA2B8000-memory.dmp
    Filesize

    32KB

  • memory/4740-912-0x000002B7B8EC0000-0x000002B7B8ED0000-memory.dmp
    Filesize

    64KB

  • memory/4740-918-0x000002B7E4790000-0x000002B7E4890000-memory.dmp
    Filesize

    1024KB

  • memory/4740-920-0x000002B7B8EC0000-0x000002B7B8ED0000-memory.dmp
    Filesize

    64KB

  • memory/4740-921-0x000002B7E4790000-0x000002B7E4890000-memory.dmp
    Filesize

    1024KB

  • memory/4740-922-0x000002B7B8EC0000-0x000002B7B8ED0000-memory.dmp
    Filesize

    64KB

  • memory/4740-189-0x000002B7E24A0000-0x000002B7E24DC000-memory.dmp
    Filesize

    240KB