Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2023 19:30

General

  • Target

    2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40.exe

  • Size

    3.5MB

  • MD5

    f0b44206b87b6e1df8021f076b065710

  • SHA1

    5a3ea1bb1b85f83da5b38951db984b4b0eebdd6c

  • SHA256

    2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40

  • SHA512

    0140268b8274f1e9b34ff246cb147dd28aab1db8ded3bbffa7ab39e90a0f5388586dd94510ab558c79d2676247c1836c5e60e53b049d191f9a062d94a55f731b

  • SSDEEP

    98304:Y1TaaKocfVGFZbwmDhH7XYVNerS7zjA2F+7rfPb4L:oNKociZbRhUVtzMMuz4

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 14 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40.exe
    "C:\Users\Admin\AppData\Local\Temp\2143041f85fe2de81c6e81a41456fc7e8ce080173cc1f4673dac1915a0be5b40.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Fsofqh.dll,start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4592
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1884
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:2192
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4028
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4488
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1404
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1208
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:2496
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4924
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4444
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4936
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1436
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:1720
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 17254
        3⤵
        • Suspicious use of FindShellTrayWindow
        PID:2296
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 416
      2⤵
      • Program crash
      PID:4532
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4240 -ip 4240
    1⤵
      PID:1400
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2124

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Fsofqh.dll

        Filesize

        3.2MB

        MD5

        a210ba96b298f8bdd099e7353ff41c15

        SHA1

        91cbac372d640bae390dd00ec6109bab337481fe

        SHA256

        7f7063ac03a3e4587cb91096e0cbe0c2ff269742ca6ed38449386d2e621dd37e

        SHA512

        79c867776bb77743b755bb0041ef1236cdfd6bbd9c6dd431ee8e6dd06fd7ac3ba0a5a6d8f20d528a13f27246ee9c84be5bc28dc882514798cb26941a26892b37

      • C:\Users\Admin\AppData\Local\Temp\Fsofqh.dll

        Filesize

        3.2MB

        MD5

        a210ba96b298f8bdd099e7353ff41c15

        SHA1

        91cbac372d640bae390dd00ec6109bab337481fe

        SHA256

        7f7063ac03a3e4587cb91096e0cbe0c2ff269742ca6ed38449386d2e621dd37e

        SHA512

        79c867776bb77743b755bb0041ef1236cdfd6bbd9c6dd431ee8e6dd06fd7ac3ba0a5a6d8f20d528a13f27246ee9c84be5bc28dc882514798cb26941a26892b37

      • C:\Users\Admin\AppData\Local\Temp\LYVTYGSI-20230220-1858.log

        Filesize

        55KB

        MD5

        9c4a61da174add27e0e3791bd6ae9aad

        SHA1

        1b69b1217ac6e80f13908214f03cfa5467755017

        SHA256

        f2addf0c6b8f639a9fa9fcffc86a5d0d218539895e6fa5739e2af1ea5151804a

        SHA512

        5aec95e1ef96acbc6131594caaa471a42b1090ab10833f2c868a374ea72906a9fffec31f96bdda17cc1fb02b24835a53df164fa96d935f220f52b5e3717cd94a

      • C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI56FB.txt

        Filesize

        11KB

        MD5

        3b9e9d2bd05c384f627fe9395b6f0d84

        SHA1

        d665ab9ff3e25af2c678208f8d72c6e7477acbe0

        SHA256

        0c4c3d40d664fd5410417a1c662ec817b2a36748976084be58a9894e61fc9d84

        SHA512

        1c765a92ca377d78b063c85ae66df4eec35e805e8766227368a848e513fbcde6e2b53ec69b09df93ee09b4edd18d37375b72156584ea06459b9e77eea960acde

      • C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI5725.txt

        Filesize

        11KB

        MD5

        07efde1a834de031adb24423dda467fa

        SHA1

        f4187705864a3bde2ce299f18e9851dac8d8fc60

        SHA256

        0b4aea52430de1420e46c7b7086d50244e787a6055eefe10e166e12a50158de3

        SHA512

        7cff2c526382bf017d5d4912271faacc4a46c8725c7c0f4e62493009a9ad0a9410088bf761719d71f3c978d665db38db0b6058d7f2e2f34a5f8989d04829de65

      • C:\Users\Admin\AppData\Local\Temp\sa.9NCBCSZSJRSB_0__.Public.InstallAgent.dat

        Filesize

        53KB

        MD5

        365cf7efd4c39a4e0ce6bf1b8e83454c

        SHA1

        f0f7e99651287e832601e2e75e5671ee01961b34

        SHA256

        39255912b36f903bcaa07b06446528d210bd0204d7f3d0fd22ae35d1502a60d1

        SHA512

        8fbf89ec61014f31961a37072d1e8e17c79a61df83780d184957be7e660d44ce23bf14962adb935eac85d2a2a96b035bd1589d64cbf01fc919b12133d3e34512

      • C:\Users\Admin\AppData\Local\Temp\wct8E66.tmp

        Filesize

        63KB

        MD5

        e516a60bc980095e8d156b1a99ab5eee

        SHA1

        238e243ffc12d4e012fd020c9822703109b987f6

        SHA256

        543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

        SHA512

        9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58

      • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

        Filesize

        697B

        MD5

        8699576660dca8bc750d4a28621acd02

        SHA1

        60007019529365df50fae860cc3e1c19ebfc353d

        SHA256

        d07937c9d7acac7eaa4c7d22160a95dec6322240cc638f6be54f40992fc1e218

        SHA512

        f723ebdd92d379faa26bd99ab4a8f6821dbefe2ded3d6ccfd97aa6302083f504424e7d253f41653f17a9c535d54921a2449807d7f3a9bf940b56ed3a015efb6a

      • memory/1208-359-0x000001F6C2A50000-0x000001F6C2D08000-memory.dmp

        Filesize

        2.7MB

      • memory/1208-365-0x000001F6C2A50000-0x000001F6C2D08000-memory.dmp

        Filesize

        2.7MB

      • memory/1404-340-0x0000019EE4F40000-0x0000019EE51F8000-memory.dmp

        Filesize

        2.7MB

      • memory/1404-344-0x0000019EE4F40000-0x0000019EE51F8000-memory.dmp

        Filesize

        2.7MB

      • memory/1436-463-0x0000024611250000-0x0000024611508000-memory.dmp

        Filesize

        2.7MB

      • memory/1436-468-0x0000024611250000-0x0000024611508000-memory.dmp

        Filesize

        2.7MB

      • memory/1720-488-0x000002092A7C0000-0x000002092AA78000-memory.dmp

        Filesize

        2.7MB

      • memory/1720-484-0x000002092A7C0000-0x000002092AA78000-memory.dmp

        Filesize

        2.7MB

      • memory/1884-254-0x00007FFDCA8F0000-0x00007FFDCA8F1000-memory.dmp

        Filesize

        4KB

      • memory/1884-255-0x0000015A0AB40000-0x0000015A0AC80000-memory.dmp

        Filesize

        1.2MB

      • memory/1884-260-0x0000015A090E0000-0x0000015A09398000-memory.dmp

        Filesize

        2.7MB

      • memory/1884-256-0x0000015A0AB40000-0x0000015A0AC80000-memory.dmp

        Filesize

        1.2MB

      • memory/1884-257-0x0000015A090E0000-0x0000015A09398000-memory.dmp

        Filesize

        2.7MB

      • memory/1884-258-0x0000015A090E0000-0x0000015A09398000-memory.dmp

        Filesize

        2.7MB

      • memory/1884-259-0x0000015A090E0000-0x0000015A09398000-memory.dmp

        Filesize

        2.7MB

      • memory/2192-282-0x0000022D5CBC0000-0x0000022D5CE78000-memory.dmp

        Filesize

        2.7MB

      • memory/2192-278-0x0000022D5CBC0000-0x0000022D5CE78000-memory.dmp

        Filesize

        2.7MB

      • memory/2296-505-0x00000155B3500000-0x00000155B37B8000-memory.dmp

        Filesize

        2.7MB

      • memory/2496-385-0x000001E5F4010000-0x000001E5F42C8000-memory.dmp

        Filesize

        2.7MB

      • memory/2496-381-0x000001E5F4010000-0x000001E5F42C8000-memory.dmp

        Filesize

        2.7MB

      • memory/4028-298-0x0000027782920000-0x0000027782BD8000-memory.dmp

        Filesize

        2.7MB

      • memory/4028-303-0x0000027782920000-0x0000027782BD8000-memory.dmp

        Filesize

        2.7MB

      • memory/4240-135-0x0000000000400000-0x0000000002696000-memory.dmp

        Filesize

        34.6MB

      • memory/4240-134-0x00000000047F0000-0x0000000004D73000-memory.dmp

        Filesize

        5.5MB

      • memory/4240-140-0x0000000000400000-0x0000000002696000-memory.dmp

        Filesize

        34.6MB

      • memory/4444-422-0x0000021AFBB90000-0x0000021AFBE48000-memory.dmp

        Filesize

        2.7MB

      • memory/4444-426-0x0000021AFBB90000-0x0000021AFBE48000-memory.dmp

        Filesize

        2.7MB

      • memory/4488-319-0x000001BE02950000-0x000001BE02C08000-memory.dmp

        Filesize

        2.7MB

      • memory/4488-323-0x000001BE02950000-0x000001BE02C08000-memory.dmp

        Filesize

        2.7MB

      • memory/4592-236-0x000001E153610000-0x000001E1538C8000-memory.dmp

        Filesize

        2.7MB

      • memory/4592-233-0x00007FFDCA8F0000-0x00007FFDCA8F1000-memory.dmp

        Filesize

        4KB

      • memory/4592-237-0x0000000000200000-0x00000000004A7000-memory.dmp

        Filesize

        2.7MB

      • memory/4592-238-0x000001E153610000-0x000001E1538C8000-memory.dmp

        Filesize

        2.7MB

      • memory/4592-235-0x000001E1534C0000-0x000001E153600000-memory.dmp

        Filesize

        1.2MB

      • memory/4592-241-0x000001E153610000-0x000001E1538C8000-memory.dmp

        Filesize

        2.7MB

      • memory/4592-234-0x000001E1534C0000-0x000001E153600000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-245-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-226-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-248-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-249-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-250-0x0000000004130000-0x0000000004131000-memory.dmp

        Filesize

        4KB

      • memory/4820-251-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-252-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-253-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-243-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-240-0x0000000000400000-0x0000000000735000-memory.dmp

        Filesize

        3.2MB

      • memory/4820-232-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-231-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-230-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-229-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

        Filesize

        4KB

      • memory/4820-261-0x0000000000400000-0x0000000000735000-memory.dmp

        Filesize

        3.2MB

      • memory/4820-228-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-263-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-265-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-266-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-267-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-269-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-270-0x0000000004140000-0x0000000004141000-memory.dmp

        Filesize

        4KB

      • memory/4820-271-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-246-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-225-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-224-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-222-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-221-0x0000000000400000-0x0000000000735000-memory.dmp

        Filesize

        3.2MB

      • memory/4820-220-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-219-0x0000000004160000-0x00000000042A0000-memory.dmp

        Filesize

        1.2MB

      • memory/4820-218-0x0000000002F70000-0x0000000002F71000-memory.dmp

        Filesize

        4KB

      • memory/4820-217-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-216-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-185-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-184-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-139-0x0000000000750000-0x0000000000751000-memory.dmp

        Filesize

        4KB

      • memory/4820-141-0x0000000000770000-0x0000000000771000-memory.dmp

        Filesize

        4KB

      • memory/4820-183-0x00000000040A0000-0x00000000040A1000-memory.dmp

        Filesize

        4KB

      • memory/4820-182-0x0000000003460000-0x0000000003FC2000-memory.dmp

        Filesize

        11.4MB

      • memory/4820-142-0x0000000000400000-0x0000000000735000-memory.dmp

        Filesize

        3.2MB

      • memory/4820-143-0x0000000000400000-0x0000000000735000-memory.dmp

        Filesize

        3.2MB

      • memory/4820-181-0x0000000000400000-0x0000000000735000-memory.dmp

        Filesize

        3.2MB

      • memory/4924-406-0x00000205BDF70000-0x00000205BE228000-memory.dmp

        Filesize

        2.7MB

      • memory/4924-402-0x00000205BDF70000-0x00000205BE228000-memory.dmp

        Filesize

        2.7MB

      • memory/4936-447-0x000001E6B9F80000-0x000001E6BA238000-memory.dmp

        Filesize

        2.7MB

      • memory/4936-443-0x000001E6B9F80000-0x000001E6BA238000-memory.dmp

        Filesize

        2.7MB