Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 01:35

General

  • Target

    Set@up#!Files-P@ssw0rD__~2402~_/libxcb-util-1.dll

  • Size

    23KB

  • MD5

    ee6788d3d3750421e01519a27f86634e

  • SHA1

    48f4c7dc7bd1208f07e4176e78f035d36682d687

  • SHA256

    b5acf358ff97127eac9ef4c664a980b937376b5295ef23d77ee338225de10d60

  • SHA512

    12ef0ac4cf9c8461044317e693bcfabdb4beb34a222b635ba50f6652b5a91b92ff20cb19e916ac60dca3e8314b7d8cec710a1c730374bb8f260b8d94f57c9775

  • SSDEEP

    384:FlSwg+49czS++g6Od6e4um1J47E6Lx7Ow7qOocOS1:FlWgPdX66wwQJk

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Set@up#!Files-P@ssw0rD__~2402~_\libxcb-util-1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Set@up#!Files-P@ssw0rD__~2402~_\libxcb-util-1.dll,#1
      2⤵
        PID:2100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 552
          3⤵
          • Program crash
          PID:2512
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2100 -ip 2100
      1⤵
        PID:3700
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1216
        • C:\Windows\system32\dashost.exe
          dashost.exe {3721e4d8-b7a8-44be-b61427b5ae413b47}
          2⤵
            PID:4384
        • C:\Windows\system32\mspaint.exe
          "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\AssertStop.ico"
          1⤵
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:3160
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4276
          • C:\Windows\system32\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\CompareConvertTo.cfg
            2⤵
            • Opens file in notepad (likely ransom note)
            PID:1772

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2100-1-0x000000006DFD0000-0x000000006DFF3000-memory.dmp

          Filesize

          140KB

        • memory/2100-0-0x000000006DBD0000-0x000000006DBDE000-memory.dmp

          Filesize

          56KB

        • memory/2100-2-0x000000006DC20000-0x000000006DC48000-memory.dmp

          Filesize

          160KB

        • memory/2100-3-0x000000006DDC0000-0x000000006DDE0000-memory.dmp

          Filesize

          128KB

        • memory/2100-4-0x000000006DBC0000-0x000000006DBCF000-memory.dmp

          Filesize

          60KB

        • memory/2100-5-0x000000006DC50000-0x000000006DC5D000-memory.dmp

          Filesize

          52KB