Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-06-2024 06:06

General

  • Target

    $TEMPfolder/DomriuAdoej/RiamgIro.exe

  • Size

    116KB

  • MD5

    99fb02b5e8c709549b572ca088ef2afc

  • SHA1

    28dd044a1ffed7d4f3005dc5470f71b631d3de43

  • SHA256

    2f44957b1bcb8a6b46a4a4ab0040e417697e0821cea4d400f84f97ff88a7225a

  • SHA512

    8e0bdbd3f404a05ecd2722db9bdd2d7487997a27d20bcbebfbf426434a0caeecb1ab03ae85aeee9fefa5fdef17163e82e96b31726668aad20731af5e69a925b0

  • SSDEEP

    3072:J/lW4FO5E8Z1RydXR532Bs+llHIWGRrPXmXQ7X:s5BydXX57X

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMPfolder\DomriuAdoej\RiamgIro.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMPfolder\DomriuAdoej\RiamgIro.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Windows\SysWOW64\ipconfig.exe
      ipconfig.exe /renew
      2⤵
      • Gathers network information
      PID:860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\$TEMPfolder\DomriuAdoej\RictiFahr.dat

    Filesize

    1.2MB

    MD5

    ffb0ef3bf23f1a30171edc95f1b7b30e

    SHA1

    a863db9f08ac0ddb04b24ac2b327418fc02c03a1

    SHA256

    44d2b37b8d0f5631f8cb78d79835024f9e409e2ead05a875705415e78754a1e9

    SHA512

    e5692ab4de4bd0db0358c52ebcaa7c38e81b8b3ab6defc36f8840e98252a8a1773112f7153e7920b8d9ba1d35be80c16a2a32da462b073e662750e6c4e4d2a7a