Analysis

  • max time kernel
    7s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 18:11

General

  • Target

    rufus-4.3p.exe

  • Size

    1.4MB

  • MD5

    12501c163c493bf13a05e5c042b576e3

  • SHA1

    9f07ccd9a1d1e3fdd070948f04aa4277b6771a82

  • SHA256

    9158fed9fb694bc7f7c0520205c101defdffe225a4c1f9af1a3c62314d51fdca

  • SHA512

    a4e4d0ee96ce4636b596ac2a1374f375a56c0633e7f02139ba00563ae8630352a54a2a289b02d7651184541a720298d41b25d6198141cc4ce65d003bc4768e7c

  • SSDEEP

    24576:CoRf/WouwddWDwEJ3xohbEsB7I0hKGfpdRimVtWJ5MW7UQnEl48BD/lHt+HsCL+V:CoJ/OEdWTIpEY7NzpdR4JnnEl4UDBQHg

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rufus-4.3p.exe
    "C:\Users\Admin\AppData\Local\Temp\rufus-4.3p.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1220
  • C:\Windows\System32\vds.exe
    C:\Windows\System32\vds.exe
    1⤵
      PID:3860
    • C:\Windows\System32\vdsldr.exe
      C:\Windows\System32\vdsldr.exe -Embedding
      1⤵
        PID:4216
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
        1⤵
          PID:2480
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
          1⤵
            PID:1500
          • C:\Windows\System32\vds.exe
            C:\Windows\System32\vds.exe
            1⤵
              PID:3136

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\rufus.ini

                    Filesize

                    41B

                    MD5

                    83903546f96533471998163f9c0df829

                    SHA1

                    af5a6313cbd83174053cf0d7b3ee690f36f892b3

                    SHA256

                    4f698d9a168878878311ff0bc2639ab46aebb22ead6b60cc728adf7029de6d89

                    SHA512

                    c7f1c798e378f7a6e92b50abd9240358b9120b31cb0d66f55d39be8439504e4dcaff4d833fc922560354f649846c96fb39b6c55b6f4ce6e15773bbceffba4ceb

                  • C:\Users\Admin\AppData\Local\Temp\rufus.ini

                    Filesize

                    70B

                    MD5

                    865d3c4929bc4a6039fcc01e559c2efd

                    SHA1

                    a7906e37597c85581481e6aab99725410e924fa8

                    SHA256

                    968bfed1a38a8ca49076efbb0f9c8c0cbfb0a9dc1a9b1f055263ccb6e13ac33f

                    SHA512

                    39e9e9dcb1ae0afaa23893f859ba53990de910ac826c72cfe1aeb7ec40e5ca1c706750c73d9ee99e5175ce08ac5eed21ff6b3a96f85d4581efd74bd5c9f82287

                  • memory/1220-0-0x00007FF74DC30000-0x00007FF74E010000-memory.dmp

                    Filesize

                    3.9MB

                  • memory/1220-52-0x00007FF74DC30000-0x00007FF74E010000-memory.dmp

                    Filesize

                    3.9MB

                  • memory/1220-67-0x00007FF74DC30000-0x00007FF74E010000-memory.dmp

                    Filesize

                    3.9MB