Analysis

  • max time kernel
    514s
  • max time network
    518s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18-06-2024 12:26

General

  • Target

    RelievedkUtility.exe

  • Size

    1.5MB

  • MD5

    a6a0f7c173094f8dafef996157751ecf

  • SHA1

    c0dcae7c4c80be25661d22400466b4ea074fc580

  • SHA256

    b055fee85472921575071464a97a79540e489c1c3a14b9bdfbdbab60e17f36e4

  • SHA512

    965d43f06d104bf6707513c459f18aaf8b049f4a043643d720b184ed9f1bb6c929309c51c3991d5aaff7b9d87031a7248ee3274896521abe955d0e49f901ac94

  • SSDEEP

    24576:mGIyixBMj+/A2d+UKnvT+LwZWj7iDDVVYrz0rbzGTw3DoA/sk6smE:mGbj+/BpKnvyIxVV/XDoAfmE

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RelievedkUtility.exe
    "C:\Users\Admin\AppData\Local\Temp\RelievedkUtility.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    PID:4904
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:828
    • C:\Users\Admin\AppData\Local\Temp\RelievedkUtility.exe
      "C:\Users\Admin\AppData\Local\Temp\RelievedkUtility.exe"
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2404

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Event Triggered Execution

    1
    T1546

    Component Object Model Hijacking

    1
    T1546.015

    Privilege Escalation

    Event Triggered Execution

    1
    T1546

    Component Object Model Hijacking

    1
    T1546.015

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Program Files\7-Zip\7-zip.dll
      Filesize

      92KB

      MD5

      c3af132ea025d289ab4841fc00bb74af

      SHA1

      0a9973d5234cc55b8b97bbb82c722b910c71cbaf

      SHA256

      56b1148a7f96f730d7085f90cadda4980d31cad527d776545c5223466f9ffb52

      SHA512

      707097953d876fa8f25bfefb19bfb3af402b8a6a5d5c35a2d84282818df4466feba63b6401b9b9f11468a2189dcc7f504c51e4590a5e32e635eb4f5710fd80b2