Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    04-05-2021 22:36

General

  • Target

    afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe

  • Size

    1.1MB

  • MD5

    72a26fa05b969712a0a8d0969703a701

  • SHA1

    b927f496623f006ab393cd735c3b6b45ecc2e584

  • SHA256

    afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c

  • SHA512

    18bed2e88fb3ecc723677df23ed2efffa7dce57d3e9b48cf18d2c1ae2898b405cabce95079691b088f30eecc25ca685db4550157b4cbee9a87c17559d11e8e34

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
    "C:\Users\Admin\AppData\Local\Temp\afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Users\Admin\AppData\Local\Temp\afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
        "C:\Users\Admin\AppData\Local\Temp\afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Users\Admin\AppData\Local\Temp\._cache_afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:1460
          • C:\Windows\svchost.exe
            "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:624
            • C:\Users\Admin\AppData\Local\Temp\._cache_afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
              "C:\Users\Admin\AppData\Local\Temp\._cache_afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe"
              6⤵
              • Executes dropped EXE
              PID:1252
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:1656
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    PID:1192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    8b3d51b59e47b441282461d3a60a1219

    SHA1

    e6f37da5ef5a2b7a73266bd99bee7dd11cf9f296

    SHA256

    c0ea67bbd6a07dcdea1b8f3a70cdead881d1992981df51f1de3ec69a7993acce

    SHA512

    fd4cf0f57f4353106ca49e65b4edd7a1e43476de67951152d78fe6428e7be31bd1eced17fb650fc5cd244deafa94ad2ea53a1a3447a4e0567309cd13c9ecabbb

  • C:\Users\Admin\AppData\Local\Temp\._cache_afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
    MD5

    12aea107dd8f0481e22a8e1b13001c06

    SHA1

    1cdccbecbd65e88808c307259c9358a14a19f4bb

    SHA256

    9151f320c031cd7c7800779713f60416145683fad1aea8123a56904329475177

    SHA512

    120f4c36f0f8b60d03c68562fe7a6dc508f724709fb6178b37e35f04f74b58bdd656f8080a2924050cd441d2a15f6e82285502eaa77fb7618feb501dc335c676

  • C:\Users\Admin\AppData\Local\Temp\._cache_afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
    MD5

    12aea107dd8f0481e22a8e1b13001c06

    SHA1

    1cdccbecbd65e88808c307259c9358a14a19f4bb

    SHA256

    9151f320c031cd7c7800779713f60416145683fad1aea8123a56904329475177

    SHA512

    120f4c36f0f8b60d03c68562fe7a6dc508f724709fb6178b37e35f04f74b58bdd656f8080a2924050cd441d2a15f6e82285502eaa77fb7618feb501dc335c676

  • C:\Users\Admin\AppData\Local\Temp\._cache_afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
    MD5

    aa692f79a6a987d901ebe73f8bf2c47b

    SHA1

    3cc5384d8a512bb3936b1587ae067f5fa3849f3e

    SHA256

    fe932e679f28d3572a36b2a115489e4a6523b2913cfe197ad8d2dc7dc6dc343f

    SHA512

    5d73ad2ffb3772b62ac60dba90f1aefcedd83b7c194388d29a0b2257ff8c0581f894be7f2c815f7ec65b23dc0ec79eb0ddb2ba3008c82093f343acdb28e838f8

  • C:\Users\Admin\AppData\Local\Temp\afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
    MD5

    99a06c34eecea819e6350654534dcc7a

    SHA1

    a7c5b01862d1cc8dea089fa52a7ab69493c054ce

    SHA256

    56aa8a44444bcbecf486e0595c0d2419ae113da88172a5575d446a7f352349b3

    SHA512

    620f82d4ed0015682a2820db7b707a0892375dc312c75b585f30bf36fb7e5ef2701ca9dd3ace11c0f703779002969db62ba9f7cb26657dfe11a888425e77d0e7

  • C:\Users\Admin\AppData\Local\Temp\afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
    MD5

    99a06c34eecea819e6350654534dcc7a

    SHA1

    a7c5b01862d1cc8dea089fa52a7ab69493c054ce

    SHA256

    56aa8a44444bcbecf486e0595c0d2419ae113da88172a5575d446a7f352349b3

    SHA512

    620f82d4ed0015682a2820db7b707a0892375dc312c75b585f30bf36fb7e5ef2701ca9dd3ace11c0f703779002969db62ba9f7cb26657dfe11a888425e77d0e7

  • C:\Windows\svchost.exe
    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe
    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe
    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe
    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • \ProgramData\Synaptics\Synaptics.exe
    MD5

    8b3d51b59e47b441282461d3a60a1219

    SHA1

    e6f37da5ef5a2b7a73266bd99bee7dd11cf9f296

    SHA256

    c0ea67bbd6a07dcdea1b8f3a70cdead881d1992981df51f1de3ec69a7993acce

    SHA512

    fd4cf0f57f4353106ca49e65b4edd7a1e43476de67951152d78fe6428e7be31bd1eced17fb650fc5cd244deafa94ad2ea53a1a3447a4e0567309cd13c9ecabbb

  • \ProgramData\Synaptics\Synaptics.exe
    MD5

    8b3d51b59e47b441282461d3a60a1219

    SHA1

    e6f37da5ef5a2b7a73266bd99bee7dd11cf9f296

    SHA256

    c0ea67bbd6a07dcdea1b8f3a70cdead881d1992981df51f1de3ec69a7993acce

    SHA512

    fd4cf0f57f4353106ca49e65b4edd7a1e43476de67951152d78fe6428e7be31bd1eced17fb650fc5cd244deafa94ad2ea53a1a3447a4e0567309cd13c9ecabbb

  • \Users\Admin\AppData\Local\Temp\._cache_afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
    MD5

    12aea107dd8f0481e22a8e1b13001c06

    SHA1

    1cdccbecbd65e88808c307259c9358a14a19f4bb

    SHA256

    9151f320c031cd7c7800779713f60416145683fad1aea8123a56904329475177

    SHA512

    120f4c36f0f8b60d03c68562fe7a6dc508f724709fb6178b37e35f04f74b58bdd656f8080a2924050cd441d2a15f6e82285502eaa77fb7618feb501dc335c676

  • \Users\Admin\AppData\Local\Temp\._cache_afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
    MD5

    aa692f79a6a987d901ebe73f8bf2c47b

    SHA1

    3cc5384d8a512bb3936b1587ae067f5fa3849f3e

    SHA256

    fe932e679f28d3572a36b2a115489e4a6523b2913cfe197ad8d2dc7dc6dc343f

    SHA512

    5d73ad2ffb3772b62ac60dba90f1aefcedd83b7c194388d29a0b2257ff8c0581f894be7f2c815f7ec65b23dc0ec79eb0ddb2ba3008c82093f343acdb28e838f8

  • \Users\Admin\AppData\Local\Temp\afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
    MD5

    99a06c34eecea819e6350654534dcc7a

    SHA1

    a7c5b01862d1cc8dea089fa52a7ab69493c054ce

    SHA256

    56aa8a44444bcbecf486e0595c0d2419ae113da88172a5575d446a7f352349b3

    SHA512

    620f82d4ed0015682a2820db7b707a0892375dc312c75b585f30bf36fb7e5ef2701ca9dd3ace11c0f703779002969db62ba9f7cb26657dfe11a888425e77d0e7

  • \Users\Admin\AppData\Local\Temp\afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
    MD5

    99a06c34eecea819e6350654534dcc7a

    SHA1

    a7c5b01862d1cc8dea089fa52a7ab69493c054ce

    SHA256

    56aa8a44444bcbecf486e0595c0d2419ae113da88172a5575d446a7f352349b3

    SHA512

    620f82d4ed0015682a2820db7b707a0892375dc312c75b585f30bf36fb7e5ef2701ca9dd3ace11c0f703779002969db62ba9f7cb26657dfe11a888425e77d0e7

  • \Users\Admin\AppData\Local\Temp\afb1e67808ed7898edc5c26ae38d8b565b53bff12133f955b7bdb46421c1126c.exe
    MD5

    99a06c34eecea819e6350654534dcc7a

    SHA1

    a7c5b01862d1cc8dea089fa52a7ab69493c054ce

    SHA256

    56aa8a44444bcbecf486e0595c0d2419ae113da88172a5575d446a7f352349b3

    SHA512

    620f82d4ed0015682a2820db7b707a0892375dc312c75b585f30bf36fb7e5ef2701ca9dd3ace11c0f703779002969db62ba9f7cb26657dfe11a888425e77d0e7

  • memory/624-76-0x0000000000000000-mapping.dmp
  • memory/1252-79-0x0000000000000000-mapping.dmp
  • memory/1460-73-0x0000000000000000-mapping.dmp
  • memory/1656-83-0x0000000000000000-mapping.dmp
  • memory/1656-86-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/1972-60-0x0000000000000000-mapping.dmp
  • memory/2004-67-0x0000000075051000-0x0000000075053000-memory.dmp
    Filesize

    8KB

  • memory/2004-65-0x0000000000000000-mapping.dmp
  • memory/2004-69-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB