Analysis

  • max time kernel
    260s
  • max time network
    319s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 10:05

General

  • Target

    53dafe9c6278b991c4645b207c24f6b58c94d37bd9647b63e5d61ec0ffe156e5.exe

  • Size

    11.7MB

  • MD5

    f056c852b748458e7db678352d91eb1d

  • SHA1

    4f03fb6d75cd1bfb5b7a1e49feca438798a2b144

  • SHA256

    53dafe9c6278b991c4645b207c24f6b58c94d37bd9647b63e5d61ec0ffe156e5

  • SHA512

    8c6759541af7a0e233c363f7aa10eaa7e96dd66094098e8269ef6ae92f03e92a99faaba71f4fc74c6f11af1b8009b490fcdb29d9182de89cb60ea177566f9262

  • SSDEEP

    98304:+DGCo6cWy7JlG49hbzPvRhJBAUZLHlrPz4rb9:ueVTJVhf4J

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 42 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53dafe9c6278b991c4645b207c24f6b58c94d37bd9647b63e5d61ec0ffe156e5.exe
    "C:\Users\Admin\AppData\Local\Temp\53dafe9c6278b991c4645b207c24f6b58c94d37bd9647b63e5d61ec0ffe156e5.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2476
    • F:\97ayiyrU_d5\pNOdZz0tq\X8CzS4FDiGM\40Jsioqi\OAt2grVzjHU\iKtcF2XCCTI\MUXnA9YGV\g4rxZKuKej.exe
      F:\97ayiyrU_d5\pNOdZz0tq\X8CzS4FDiGM\40Jsioqi\OAt2grVzjHU\iKtcF2XCCTI\MUXnA9YGV\g4rxZKuKej.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\SysWOW64\wuapp.exe
        C:\Windows\SysWOW64\wuapp.exe
        3⤵
          PID:2224
        • C:\Windows\SysWOW64\diskraid.exe
          C:\Windows\SysWOW64\diskraid.exe
          3⤵
          • Suspicious use of SetWindowsHookEx
          PID:2928
        • C:\Windows\SysWOW64\eudcedit.exe
          C:\Windows\SysWOW64\eudcedit.exe
          3⤵
          • Suspicious use of SetWindowsHookEx
          PID:1732
        • C:\Windows\SysWOW64\msiexec.exe
          C:\Windows\SysWOW64\msiexec.exe
          3⤵
            PID:3052
          • C:\Windows\SysWOW64\fixmapi.exe
            C:\Windows\SysWOW64\fixmapi.exe
            3⤵
              PID:2824
            • C:\Windows\SysWOW64\TapiUnattend.exe
              C:\Windows\SysWOW64\TapiUnattend.exe
              3⤵
              • Suspicious use of SetWindowsHookEx
              PID:2844
            • C:\Windows\SysWOW64\dcomcnfg.exe
              C:\Windows\SysWOW64\dcomcnfg.exe
              3⤵
              • Suspicious use of SetWindowsHookEx
              PID:2816
            • C:\Windows\SysWOW64\typeperf.exe
              C:\Windows\SysWOW64\typeperf.exe
              3⤵
              • Suspicious use of SetWindowsHookEx
              PID:300
            • C:\Windows\SysWOW64\reg.exe
              C:\Windows\SysWOW64\reg.exe
              3⤵
                PID:2672
              • C:\Windows\SysWOW64\srdelayed.exe
                C:\Windows\SysWOW64\srdelayed.exe
                3⤵
                  PID:2680
                • C:\Windows\SysWOW64\iscsicli.exe
                  C:\Windows\SysWOW64\iscsicli.exe
                  3⤵
                    PID:1060
                  • C:\Windows\SysWOW64\wscript.exe
                    C:\Windows\SysWOW64\wscript.exe
                    3⤵
                      PID:2868
                    • C:\Windows\SysWOW64\perfhost.exe
                      C:\Windows\SysWOW64\perfhost.exe
                      3⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:908
                    • C:\Windows\SysWOW64\SystemPropertiesPerformance.exe
                      C:\Windows\SysWOW64\SystemPropertiesPerformance.exe
                      3⤵
                        PID:2812
                      • C:\Windows\SysWOW64\unlodctr.exe
                        C:\Windows\SysWOW64\unlodctr.exe
                        3⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:2316
                      • C:\Windows\SysWOW64\credwiz.exe
                        C:\Windows\SysWOW64\credwiz.exe
                        3⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:3032
                      • C:\Windows\SysWOW64\SystemPropertiesComputerName.exe
                        C:\Windows\SysWOW64\SystemPropertiesComputerName.exe
                        3⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:2144
                      • C:\Windows\SysWOW64\ROUTE.EXE
                        C:\Windows\SysWOW64\ROUTE.EXE
                        3⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:2728
                      • C:\Windows\SysWOW64\user.exe
                        C:\Windows\SysWOW64\user.exe
                        3⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:2524
                      • C:\Windows\SysWOW64\makecab.exe
                        C:\Windows\SysWOW64\makecab.exe
                        3⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:1496
                      • C:\Windows\SysWOW64\SystemPropertiesRemote.exe
                        C:\Windows\SysWOW64\SystemPropertiesRemote.exe
                        3⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:848
                      • C:\Windows\SysWOW64\certutil.exe
                        C:\Windows\SysWOW64\certutil.exe
                        3⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:2076
                      • C:\Windows\SysWOW64\rasdial.exe
                        C:\Windows\SysWOW64\rasdial.exe
                        3⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:1992
                      • C:\Windows\SysWOW64\choice.exe
                        C:\Windows\SysWOW64\choice.exe
                        3⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:2004
                      • C:\Windows\SysWOW64\SearchIndexer.exe
                        C:\Windows\SysWOW64\SearchIndexer.exe
                        3⤵
                          PID:1608
                        • C:\Windows\SysWOW64\SyncHost.exe
                          C:\Windows\SysWOW64\SyncHost.exe
                          3⤵
                            PID:1224
                          • C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention.exe
                            C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention.exe
                            3⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:1616
                          • C:\Windows\SysWOW64\mcbuilder.exe
                            C:\Windows\SysWOW64\mcbuilder.exe
                            3⤵
                              PID:2656
                            • C:\Windows\SysWOW64\label.exe
                              C:\Windows\SysWOW64\label.exe
                              3⤵
                                PID:2888
                              • C:\Windows\SysWOW64\SndVol.exe
                                C:\Windows\SysWOW64\SndVol.exe
                                3⤵
                                • Suspicious use of SetWindowsHookEx
                                PID:2876
                              • F:\97ayiyrU_d5\pNOdZz0tq\X8CzS4FDiGM\40Jsioqi\OAt2grVzjHU\iKtcF2XCCTI\MUXnA9YGV\WKqaLsed3t_d5.exe
                                F:\97ayiyrU_d5\pNOdZz0tq\X8CzS4FDiGM\40Jsioqi\OAt2grVzjHU\iKtcF2XCCTI\MUXnA9YGV\WKqaLsed3t_d5.exe
                                3⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of SetWindowsHookEx
                                PID:2424
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\53DAFE~1.EXE > nul
                              2⤵
                                PID:2280

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\RBSFSystem.ini

                              Filesize

                              283B

                              MD5

                              71c4f73a6b7a7e1c8a196628427157a1

                              SHA1

                              7d9e2583f46984090afcf6597fbfb0353bfa9f1a

                              SHA256

                              8d0a06fd52b638f7d13feadb3dfdf11f2834ebccbfea350426c6805de6fc621b

                              SHA512

                              0fdf03581e5d4d3b5a7c3df21a83faccea869f554c0d411959d235f8bd547e7434fada77a6aab4b4cf96a812e6d794ca804186e58bc417e23d3b88288cf22b23

                            • C:\RBSFSystem.ini

                              Filesize

                              283B

                              MD5

                              71c4f73a6b7a7e1c8a196628427157a1

                              SHA1

                              7d9e2583f46984090afcf6597fbfb0353bfa9f1a

                              SHA256

                              8d0a06fd52b638f7d13feadb3dfdf11f2834ebccbfea350426c6805de6fc621b

                              SHA512

                              0fdf03581e5d4d3b5a7c3df21a83faccea869f554c0d411959d235f8bd547e7434fada77a6aab4b4cf96a812e6d794ca804186e58bc417e23d3b88288cf22b23

                            • C:\RBSFSystem.ini

                              Filesize

                              129B

                              MD5

                              78d89536fa344a82364f1dda81d78f3a

                              SHA1

                              e866b4f7713f3b6718c2b4b836937c8b35ff7c31

                              SHA256

                              32c064c7c56cae4ea4ee32cf8ee2f110f2f715ed064c28c1a5e5b4b384439fa5

                              SHA512

                              2a04d9ea26e8617c60f5af189f2fce74baf151bb414390aa617adf140bce277d492764dc7a34671d0a09c61edebbd0b9f8d3ce591a2d6d54f66495f53cce6d58

                            • C:\RBSFSystem.ini

                              Filesize

                              162B

                              MD5

                              88c2252f623186c2d6df7435bc62d21c

                              SHA1

                              069e5043a513560366a4fcef96d8c93b4a208d92

                              SHA256

                              5e7569a68fbf6ac8aeb4d3db463ad165beeb63edcf63005f66a361cdcc2c7213

                              SHA512

                              49ea66da3b80e6bfecc5efa0a7fc42830f29fc5e2113d70cd049ceb89452dc58a82e2274e7a2ce7fd63fc4f86abed4858eb4c6144b766bd91e6a8ff0844bc3ea

                            • C:\RBSFSystem.ini

                              Filesize

                              162B

                              MD5

                              88c2252f623186c2d6df7435bc62d21c

                              SHA1

                              069e5043a513560366a4fcef96d8c93b4a208d92

                              SHA256

                              5e7569a68fbf6ac8aeb4d3db463ad165beeb63edcf63005f66a361cdcc2c7213

                              SHA512

                              49ea66da3b80e6bfecc5efa0a7fc42830f29fc5e2113d70cd049ceb89452dc58a82e2274e7a2ce7fd63fc4f86abed4858eb4c6144b766bd91e6a8ff0844bc3ea

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              ac0b68474653c8666297417e595181f3

                              SHA1

                              bafc3c4323ce8351d488d078c0ed4f1209205e1b

                              SHA256

                              94d345949e6bbb7f515b26c0ab3abd6de3fdd83f0cb09ec203cf36d5f0330315

                              SHA512

                              aa06ee732d43462e7b4184a072202e8337fbce22fa62457722d910435a28707e6108b02ba7d7a01a3c5d27b18d9573e2d39fc2683d3c78d1a3145df5b34c39ad

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                              Filesize

                              344B

                              MD5

                              6b920e1c7e834a51a45501beb59cadb7

                              SHA1

                              88feaaae89a08cbccf66e7b4e012ea1ac0702465

                              SHA256

                              be3a1ea3a0974f4eda5924546d5c73dc77ed799a8ce06f55d7cd62458e9bea87

                              SHA512

                              9026ae9b1fbbe0b457ccec6cbb48b56ca371f4c7f5a3b8f44140b8be267bfce78047ab1453087f4bf7f7075a555ea1d107197014647af5d17b6c7f51d4c11acb

                            • C:\Users\Admin\AppData\Local\Temp\Cab1FF1.tmp

                              Filesize

                              61KB

                              MD5

                              f3441b8572aae8801c04f3060b550443

                              SHA1

                              4ef0a35436125d6821831ef36c28ffaf196cda15

                              SHA256

                              6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

                              SHA512

                              5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

                            • C:\Users\Admin\AppData\Local\Temp\Tar20AF.tmp

                              Filesize

                              163KB

                              MD5

                              9441737383d21192400eca82fda910ec

                              SHA1

                              725e0d606a4fc9ba44aa8ffde65bed15e65367e4

                              SHA256

                              bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

                              SHA512

                              7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

                            • C:\Users\Admin\AppData\Roaming\RBSF.ini

                              Filesize

                              1KB

                              MD5

                              b1d997ffb96d0c5fd203868df44896be

                              SHA1

                              5a55642e026b1d54281d0c0bf26373f73f3971a2

                              SHA256

                              af396129b80609110ea38b7df597e7c0b689ed90038d98c4cf4c7cc8fb2d623a

                              SHA512

                              74e499eedb965166a7ea22f40f8ea5b539e44c5076572c306486412e0bec06673a1fe48a52d9146bbe9bf60472a4fb944c4e66676eeb14b9c7463d307da358f4

                            • C:\Users\Admin\AppData\Roaming\RBSF.ini

                              Filesize

                              10B

                              MD5

                              4b80dad734fc60f3fd3030f47a9d70c2

                              SHA1

                              946c991e66a831290cf11bbd8e9748ca62f7a27f

                              SHA256

                              85e74a3678e99c8dd94f4a61600a08beeb2d982b41aa5d603c88b9e3a4ad1383

                              SHA512

                              40717479d237c1ef9e0225fa0f6306d467936238a54acebe974a7d2b1aa38131ff1a396dfdc98ca3df286e0be88fbbb9c7ef69f3a8adf7b78cd113662f5fdb6c

                            • F:\97ayiyrU_d5\pNOdZz0tq\X8CzS4FDiGM\40Jsioqi\OAt2grVzjHU\iKtcF2XCCTI\MUXnA9YGV\WKqaLsed3t_d5.exe

                              Filesize

                              6.8MB

                              MD5

                              3f8d69eb26115498cd59939c1e564212

                              SHA1

                              3c2879c65ac5c40af7472f264f021dd9b0fdd624

                              SHA256

                              9bffb565df6ad9510861f81c9e11d09ef69b4d7b539e30d65bbd26f1eb52bb81

                              SHA512

                              4b6c6a0ebf27c3facba2362fdc776bbc62e3b908eca869f55aad3e42debf445e4a1e6b89e2cef38596788e4611b942e9bd70e30d597f1b17517deb0e1f56e571

                            • F:\97ayiyrU_d5\pNOdZz0tq\X8CzS4FDiGM\40Jsioqi\OAt2grVzjHU\iKtcF2XCCTI\MUXnA9YGV\g4rxZKuKej.exe

                              Filesize

                              11.7MB

                              MD5

                              f056c852b748458e7db678352d91eb1d

                              SHA1

                              4f03fb6d75cd1bfb5b7a1e49feca438798a2b144

                              SHA256

                              53dafe9c6278b991c4645b207c24f6b58c94d37bd9647b63e5d61ec0ffe156e5

                              SHA512

                              8c6759541af7a0e233c363f7aa10eaa7e96dd66094098e8269ef6ae92f03e92a99faaba71f4fc74c6f11af1b8009b490fcdb29d9182de89cb60ea177566f9262

                            • F:\97ayiyrU_d5\pNOdZz0tq\X8CzS4FDiGM\40Jsioqi\OAt2grVzjHU\iKtcF2XCCTI\MUXnA9YGV\g4rxZKuKej.exe

                              Filesize

                              11.7MB

                              MD5

                              f056c852b748458e7db678352d91eb1d

                              SHA1

                              4f03fb6d75cd1bfb5b7a1e49feca438798a2b144

                              SHA256

                              53dafe9c6278b991c4645b207c24f6b58c94d37bd9647b63e5d61ec0ffe156e5

                              SHA512

                              8c6759541af7a0e233c363f7aa10eaa7e96dd66094098e8269ef6ae92f03e92a99faaba71f4fc74c6f11af1b8009b490fcdb29d9182de89cb60ea177566f9262

                            • memory/1732-241-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/1732-245-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/1732-250-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/1732-252-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2224-150-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2224-157-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2224-156-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2224-153-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2224-143-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2224-147-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2224-145-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2928-194-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                              Filesize

                              4KB

                            • memory/2928-222-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2928-224-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2928-226-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2928-221-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2928-219-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2928-217-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2928-216-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2928-215-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2928-213-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB

                            • memory/2928-211-0x0000000000400000-0x0000000000B20000-memory.dmp

                              Filesize

                              7.1MB