Analysis

  • max time kernel
    47s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2023 16:14

General

  • Target

    rhino_en-us_7.29.23107.03001.exe

  • Size

    293.3MB

  • MD5

    a98cdb7c0f477d356997455b91ec0a83

  • SHA1

    91b81bcc937779f65578b00303644469382ba6b8

  • SHA256

    5b315a54591d573feb569d2471d8291351a552d4b3f2e35987bc93bee1218989

  • SHA512

    f32c5a3c2bca72bcb8711c9f4edd0cd478d44dcdc7696005002a00b14bdcd37b689ee44e9d8e612e5b4307fa2d61e53430dc4eb202f2dcb326da4ed395f9ed04

  • SSDEEP

    6291456:lj7SKgeBv0/wFJblMRI5c1ec1JSq5BTTUkP9DOJd9CgSKMfRxR:ljlqwpAI5c1eQvvTX9CTcWMnR

Score
4/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rhino_en-us_7.29.23107.03001.exe
    "C:\Users\Admin\AppData\Local\Temp\rhino_en-us_7.29.23107.03001.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\Temp\{7C99AACF-3E16-44AC-8CFA-CF341ABF501E}\.cr\rhino_en-us_7.29.23107.03001.exe
      "C:\Windows\Temp\{7C99AACF-3E16-44AC-8CFA-CF341ABF501E}\.cr\rhino_en-us_7.29.23107.03001.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\rhino_en-us_7.29.23107.03001.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:1336
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x480
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1356

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    624c7ee8ec521705ae68d119e34c9478

    SHA1

    16056aa22387d4a0c83e54ffba772a23b0967e93

    SHA256

    509d696c5457cdc29c7ce1ce75bbf232c852ebfe2cdfb3a35f63d9873a1a637f

    SHA512

    1e95c896f29b0820995cf802e653d3d1722f9e056c09a7f867b8be1e3a240c73ad0bfa3e88c5a5d35bb8a51628522a5791dc67b58c60970b2b0f4803b2d7987a

  • C:\Users\Admin\AppData\Local\Temp\Tar8168.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Windows\Temp\{7C99AACF-3E16-44AC-8CFA-CF341ABF501E}\.cr\rhino_en-us_7.29.23107.03001.exe
    Filesize

    2.4MB

    MD5

    8688473204b1c396be8d0283b38c3cfe

    SHA1

    0623c7b3f05a442f8dfb22f74a9cefc7ed830101

    SHA256

    4b27492d724982382ced1ac066e4d08f116f9313dd0052fa937c49d4fbe27572

    SHA512

    ff2523f3c598045c7cc891713f147e2705fcd8cf3e0ab46e8565359b741924729e95e5573db887db7c032e2ce8a5eee8b6d24c070ad250bd3b7e77306035d175

  • C:\Windows\Temp\{7C99AACF-3E16-44AC-8CFA-CF341ABF501E}\.cr\rhino_en-us_7.29.23107.03001.exe
    Filesize

    2.4MB

    MD5

    8688473204b1c396be8d0283b38c3cfe

    SHA1

    0623c7b3f05a442f8dfb22f74a9cefc7ed830101

    SHA256

    4b27492d724982382ced1ac066e4d08f116f9313dd0052fa937c49d4fbe27572

    SHA512

    ff2523f3c598045c7cc891713f147e2705fcd8cf3e0ab46e8565359b741924729e95e5573db887db7c032e2ce8a5eee8b6d24c070ad250bd3b7e77306035d175

  • C:\Windows\Temp\{FAF1C7B2-CD60-411A-B0C8-7678B7EC150C}\.ba\BundleUI.dll
    Filesize

    2.3MB

    MD5

    a85827e94991709be32fed7fb0988f2f

    SHA1

    23f0d4fdfb35473abc85b945976f75db44c52ad0

    SHA256

    1c1f65db3f1a9481358e5094493d5c24a5fea10802727bdab541ba0834707711

    SHA512

    838c8b5ba70bbc8c1fd3aec4d9ea930491b7271174b7b52f97a3f61b8060be403d1371734aca6ad34dab8b38f00dac4bc150b5f1e410d2fb25a63938b6d69d31

  • C:\Windows\Temp\{FAF1C7B2-CD60-411A-B0C8-7678B7EC150C}\.ba\css\font-awesome.css
    Filesize

    34KB

    MD5

    553a20cd84c46cc752c594a49a24bdaa

    SHA1

    6d39a08bc85169eca450978f895f85d5d3451c0a

    SHA256

    6a8fc411147009f527b9d2e4f2955b1c15cfca90f4362067f7d5245e69d0e66f

    SHA512

    ec54ac48fa024843ac12abe40b0849a29e800e6fc6118ef0333e1294729151cac4107f6b45bea0fb240c28ac50b4f174e6f2464d72a1cd8b9a6d2d177ac1dae4

  • C:\Windows\Temp\{FAF1C7B2-CD60-411A-B0C8-7678B7EC150C}\.ba\css\styles.css
    Filesize

    4KB

    MD5

    8c557edea0726be212b27c4b47a42de6

    SHA1

    0536d457a6f2094a66733a70dc48b64b28d7e04e

    SHA256

    ae664f07e26c0b2e6df5562cc246c8a64ed8c333c71849269b98c28875e68b33

    SHA512

    8ee1161d89ad111fa69dd3c7afa428f9b93f3e4ff23197cd5efb730cb4b1afa22938c11456e7be6d2456f1ad318aed6060d62462323add0af7746749254081d4

  • C:\Windows\Temp\{FAF1C7B2-CD60-411A-B0C8-7678B7EC150C}\.ba\en\not_supported.htm
    Filesize

    1KB

    MD5

    e9389fdffaf552f8d1a3b401e77bf32e

    SHA1

    eea9557e69e611893f6597db0e86768b3bf0d143

    SHA256

    19a865e936f014b0c34192a300767032c1b02fbed0561b6b94359d8e6348c452

    SHA512

    3136085ac3379e947526dbeb6b6fc45614c3bb8d49a740b1de6b75287cddb0e0405c7d48d7e8d3254f0d5e3fbb8b0eb1b21b8d9613edc41b03c2e09bb63503c6

  • \Windows\Temp\{7C99AACF-3E16-44AC-8CFA-CF341ABF501E}\.cr\rhino_en-us_7.29.23107.03001.exe
    Filesize

    2.4MB

    MD5

    8688473204b1c396be8d0283b38c3cfe

    SHA1

    0623c7b3f05a442f8dfb22f74a9cefc7ed830101

    SHA256

    4b27492d724982382ced1ac066e4d08f116f9313dd0052fa937c49d4fbe27572

    SHA512

    ff2523f3c598045c7cc891713f147e2705fcd8cf3e0ab46e8565359b741924729e95e5573db887db7c032e2ce8a5eee8b6d24c070ad250bd3b7e77306035d175

  • \Windows\Temp\{FAF1C7B2-CD60-411A-B0C8-7678B7EC150C}\.ba\BundleUI.dll
    Filesize

    2.3MB

    MD5

    a85827e94991709be32fed7fb0988f2f

    SHA1

    23f0d4fdfb35473abc85b945976f75db44c52ad0

    SHA256

    1c1f65db3f1a9481358e5094493d5c24a5fea10802727bdab541ba0834707711

    SHA512

    838c8b5ba70bbc8c1fd3aec4d9ea930491b7271174b7b52f97a3f61b8060be403d1371734aca6ad34dab8b38f00dac4bc150b5f1e410d2fb25a63938b6d69d31

  • \Windows\Temp\{FAF1C7B2-CD60-411A-B0C8-7678B7EC150C}\.ba\fgba.dll
    Filesize

    153KB

    MD5

    3bdc9d05aceeb695d177f12fefba192f

    SHA1

    5d553025336f901af1ff69b3dcb08edcda167055

    SHA256

    52343eb4a27c2188403ba6ec56697807f59f2e96699569174d9fe0fda5dd9c44

    SHA512

    8454381d2f571cd80a217cc740c81ea2809aa01d90983c8b4777411ea7d34414bc16751ef1362407f857b4cdd48024a63f4267ec03db319f4cca44e2b9814d4c