Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    08-05-2021 20:09

General

  • Target

    69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe

  • Size

    761KB

  • MD5

    7469f362dfdd82fc4ff549cee42ba76c

  • SHA1

    fdc33fd83726628b2993c616001a7baf9f84f4d4

  • SHA256

    69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e

  • SHA512

    3629c45d4f98ae45bf0e19485d38908d9f9648050dbd993c910315a97ca12c119f83d1ce0036e694de4e2bc8c3005165909dbc25befa8f8ce9331ba7bad185b7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe
    "C:\Users\Admin\AppData\Local\Temp\69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\._cache_69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1312
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 544
        3⤵
        • Loads dropped DLL
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1812
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1976
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    MD5

    c144c878990526a18cee46c281d77eee

    SHA1

    c6335653be655370d28b7ad27798abbdd167ba3f

    SHA256

    965a50b5988bcd434146eb417f712d5f0169160d8c9d9ae13e1ff071a80cdde8

    SHA512

    f60e392a6d278348b66163f4cf2838c6ec3fb56a428c32a5a1e7833ab23ce709a1d6f501fd540f207b0d9582f700827a6ba99ee9c20001cf8526e44719780bde

  • C:\ProgramData\Synaptics\Synaptics.exe

    MD5

    c144c878990526a18cee46c281d77eee

    SHA1

    c6335653be655370d28b7ad27798abbdd167ba3f

    SHA256

    965a50b5988bcd434146eb417f712d5f0169160d8c9d9ae13e1ff071a80cdde8

    SHA512

    f60e392a6d278348b66163f4cf2838c6ec3fb56a428c32a5a1e7833ab23ce709a1d6f501fd540f207b0d9582f700827a6ba99ee9c20001cf8526e44719780bde

  • C:\Users\Admin\AppData\Local\Temp\._cache_69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe

    MD5

    efdc0bc852b613f19dbe9488561aae9f

    SHA1

    8c1a573041a399fa5015fb7bcfde0f0e35be9513

    SHA256

    48cd02636680172cd2d608a11877c70ba7fb3c6a1ea377dd301744cb7b56c84c

    SHA512

    4a59f774ab3ab72d8204486d2d1c1d0749cdb108798b7307fcbdc4aed9ef7706e45f8cda9828f309acfd2ad72c7bd582715419a9486c6d72b7217074c79cea7d

  • C:\Users\Admin\AppData\Local\Temp\._cache_69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe

    MD5

    efdc0bc852b613f19dbe9488561aae9f

    SHA1

    8c1a573041a399fa5015fb7bcfde0f0e35be9513

    SHA256

    48cd02636680172cd2d608a11877c70ba7fb3c6a1ea377dd301744cb7b56c84c

    SHA512

    4a59f774ab3ab72d8204486d2d1c1d0749cdb108798b7307fcbdc4aed9ef7706e45f8cda9828f309acfd2ad72c7bd582715419a9486c6d72b7217074c79cea7d

  • C:\Users\Admin\AppData\Local\Temp\RaVa4Kv5.xlsm

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • \ProgramData\Synaptics\Synaptics.exe

    MD5

    c144c878990526a18cee46c281d77eee

    SHA1

    c6335653be655370d28b7ad27798abbdd167ba3f

    SHA256

    965a50b5988bcd434146eb417f712d5f0169160d8c9d9ae13e1ff071a80cdde8

    SHA512

    f60e392a6d278348b66163f4cf2838c6ec3fb56a428c32a5a1e7833ab23ce709a1d6f501fd540f207b0d9582f700827a6ba99ee9c20001cf8526e44719780bde

  • \ProgramData\Synaptics\Synaptics.exe

    MD5

    c144c878990526a18cee46c281d77eee

    SHA1

    c6335653be655370d28b7ad27798abbdd167ba3f

    SHA256

    965a50b5988bcd434146eb417f712d5f0169160d8c9d9ae13e1ff071a80cdde8

    SHA512

    f60e392a6d278348b66163f4cf2838c6ec3fb56a428c32a5a1e7833ab23ce709a1d6f501fd540f207b0d9582f700827a6ba99ee9c20001cf8526e44719780bde

  • \Users\Admin\AppData\Local\Temp\._cache_69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe

    MD5

    efdc0bc852b613f19dbe9488561aae9f

    SHA1

    8c1a573041a399fa5015fb7bcfde0f0e35be9513

    SHA256

    48cd02636680172cd2d608a11877c70ba7fb3c6a1ea377dd301744cb7b56c84c

    SHA512

    4a59f774ab3ab72d8204486d2d1c1d0749cdb108798b7307fcbdc4aed9ef7706e45f8cda9828f309acfd2ad72c7bd582715419a9486c6d72b7217074c79cea7d

  • \Users\Admin\AppData\Local\Temp\._cache_69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe

    MD5

    efdc0bc852b613f19dbe9488561aae9f

    SHA1

    8c1a573041a399fa5015fb7bcfde0f0e35be9513

    SHA256

    48cd02636680172cd2d608a11877c70ba7fb3c6a1ea377dd301744cb7b56c84c

    SHA512

    4a59f774ab3ab72d8204486d2d1c1d0749cdb108798b7307fcbdc4aed9ef7706e45f8cda9828f309acfd2ad72c7bd582715419a9486c6d72b7217074c79cea7d

  • \Users\Admin\AppData\Local\Temp\._cache_69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe

    MD5

    efdc0bc852b613f19dbe9488561aae9f

    SHA1

    8c1a573041a399fa5015fb7bcfde0f0e35be9513

    SHA256

    48cd02636680172cd2d608a11877c70ba7fb3c6a1ea377dd301744cb7b56c84c

    SHA512

    4a59f774ab3ab72d8204486d2d1c1d0749cdb108798b7307fcbdc4aed9ef7706e45f8cda9828f309acfd2ad72c7bd582715419a9486c6d72b7217074c79cea7d

  • \Users\Admin\AppData\Local\Temp\._cache_69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe

    MD5

    efdc0bc852b613f19dbe9488561aae9f

    SHA1

    8c1a573041a399fa5015fb7bcfde0f0e35be9513

    SHA256

    48cd02636680172cd2d608a11877c70ba7fb3c6a1ea377dd301744cb7b56c84c

    SHA512

    4a59f774ab3ab72d8204486d2d1c1d0749cdb108798b7307fcbdc4aed9ef7706e45f8cda9828f309acfd2ad72c7bd582715419a9486c6d72b7217074c79cea7d

  • \Users\Admin\AppData\Local\Temp\._cache_69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe

    MD5

    efdc0bc852b613f19dbe9488561aae9f

    SHA1

    8c1a573041a399fa5015fb7bcfde0f0e35be9513

    SHA256

    48cd02636680172cd2d608a11877c70ba7fb3c6a1ea377dd301744cb7b56c84c

    SHA512

    4a59f774ab3ab72d8204486d2d1c1d0749cdb108798b7307fcbdc4aed9ef7706e45f8cda9828f309acfd2ad72c7bd582715419a9486c6d72b7217074c79cea7d

  • \Users\Admin\AppData\Local\Temp\._cache_69b583a01b99098a447c73edbe82bb2634980f8aecb57158037def8ba027a61e.exe

    MD5

    efdc0bc852b613f19dbe9488561aae9f

    SHA1

    8c1a573041a399fa5015fb7bcfde0f0e35be9513

    SHA256

    48cd02636680172cd2d608a11877c70ba7fb3c6a1ea377dd301744cb7b56c84c

    SHA512

    4a59f774ab3ab72d8204486d2d1c1d0749cdb108798b7307fcbdc4aed9ef7706e45f8cda9828f309acfd2ad72c7bd582715419a9486c6d72b7217074c79cea7d

  • memory/1312-72-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1312-63-0x0000000000000000-mapping.dmp

  • memory/1652-60-0x00000000754F1000-0x00000000754F3000-memory.dmp

    Filesize

    8KB

  • memory/1652-61-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1660-74-0x000000002FA71000-0x000000002FA74000-memory.dmp

    Filesize

    12KB

  • memory/1660-80-0x000000006FA41000-0x000000006FA43000-memory.dmp

    Filesize

    8KB

  • memory/1660-81-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1812-75-0x0000000000000000-mapping.dmp

  • memory/1812-85-0x0000000001D40000-0x0000000001D41000-memory.dmp

    Filesize

    4KB

  • memory/1976-71-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1976-68-0x0000000000000000-mapping.dmp