Analysis

  • max time kernel
    6s
  • max time network
    5s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 16:45

General

  • Target

    rufus-3.20.exe

  • Size

    1.3MB

  • MD5

    5ad27aff27dd768189be9c00c7e7a0af

  • SHA1

    4f0a7b1a9ad3c2322615959fa11867b37aec4bd6

  • SHA256

    042f0b284af6e3316baf6235a4f0141966a051873b5631c7e5a724cf1f5e7973

  • SHA512

    6fe9be42fd02597ac494e54028fc6aac7d642795d4fae30334142d262a22c06f9f808e6dae1813f234d171c314e838fdecfb86486770fad3e60196b6fcab2fea

  • SSDEEP

    24576:rW+DdfQWyu2z24+LQqbUJe9JvWIuI/ED5KdsQW8zC/gQePLdvLCuMR2lvKoeQJOS:rDDdIs2z5+LNU073Z29mvJvKcJf

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rufus-3.20.exe
    "C:\Users\Admin\AppData\Local\Temp\rufus-3.20.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2288
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:2252
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
        PID:2748

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        c90e7ab55c09f1047c96d7750033ffda

        SHA1

        6f16ed34c12da049ebfde84ee970f487a14320e2

        SHA256

        0297df84a80a58eb38b5d004a9aaa7916181bf1785d2842f3998e56618ccb373

        SHA512

        e65219a24461956f23fd23d7ede18aa1343c9e7270cf06b9761555bf8f437a91dca84aff7791a1636e9e2500ba4a0476c05cc3958bdb296bd389b0b2c92684ab

      • C:\Users\Admin\AppData\Local\Temp\Cab17A9.tmp
        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Temp\Tar1809.tmp
        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • memory/2288-0-0x0000000000CB0000-0x0000000001095000-memory.dmp
        Filesize

        3.9MB