Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 06:06

General

  • Target

    $TEMPfolder/DomriuAdoej/RiamgIro.exe

  • Size

    116KB

  • MD5

    99fb02b5e8c709549b572ca088ef2afc

  • SHA1

    28dd044a1ffed7d4f3005dc5470f71b631d3de43

  • SHA256

    2f44957b1bcb8a6b46a4a4ab0040e417697e0821cea4d400f84f97ff88a7225a

  • SHA512

    8e0bdbd3f404a05ecd2722db9bdd2d7487997a27d20bcbebfbf426434a0caeecb1ab03ae85aeee9fefa5fdef17163e82e96b31726668aad20731af5e69a925b0

  • SSDEEP

    3072:J/lW4FO5E8Z1RydXR532Bs+llHIWGRrPXmXQ7X:s5BydXX57X

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMPfolder\DomriuAdoej\RiamgIro.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMPfolder\DomriuAdoej\RiamgIro.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Enumerates system info in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Windows\system32\ipconfig.exe
      ipconfig.exe /renew
      2⤵
      • Loads dropped DLL
      • Gathers network information
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\dnsapi.dll

    Filesize

    264KB

    MD5

    a8ce23c04516bd5d4d1c4a9e62b43a1f

    SHA1

    36cbeba1499fe2236ebe98a1ae463654dd012f77

    SHA256

    bafaaab3736c1e3d9e1b38f2fc76476e5cd76d31bf8dea8f4b092c2ebfe36271

    SHA512

    a16425c814bf29f9267c1c4c0c912da6a63b1fecacfef101ff3488fd080901d583c5a1706b3b27c324215b5230bca59816b0d580b538b27eb4fb80317c965069

  • C:\Windows\System32\dnsapi.dll

    Filesize

    349KB

    MD5

    1260f0aac29fab9ebd48c76803cf2a28

    SHA1

    489ebc07226618bc37564a471d14232873868d22

    SHA256

    c524dd903a5a6dd36e35dd2663f967c8d259f875dc8ecd3d85bd894efac6b954

    SHA512

    6a5469a69add3ca47104ce77ef9ae38e86c637985a01ebaf5e12e4ea7fa9307f532de476b92cd4889ddc0d20b10abe8bb67636e57e85b9bc89b723fb3ff348d4

  • \Users\Admin\AppData\Local\Temp\$TEMPfolder\DomriuAdoej\RictiFahr.dat

    Filesize

    1.2MB

    MD5

    ffb0ef3bf23f1a30171edc95f1b7b30e

    SHA1

    a863db9f08ac0ddb04b24ac2b327418fc02c03a1

    SHA256

    44d2b37b8d0f5631f8cb78d79835024f9e409e2ead05a875705415e78754a1e9

    SHA512

    e5692ab4de4bd0db0358c52ebcaa7c38e81b8b3ab6defc36f8840e98252a8a1773112f7153e7920b8d9ba1d35be80c16a2a32da462b073e662750e6c4e4d2a7a