Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    08-05-2021 22:40

General

  • Target

    2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd.exe

  • Size

    722KB

  • MD5

    f59685a74da27f107abd2212bb291af4

  • SHA1

    2741e93fe708923a9634fc003207192e1fa81515

  • SHA256

    2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

  • SHA512

    86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious Office macro 14 IoCs

    Office document equipped with macros.

  • Loads dropped DLL 7 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd.exe
    "C:\Users\Admin\AppData\Local\Temp\2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe
      "C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C schtasks /QUERY /TN "Google Chrome Helper Update"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1128
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /QUERY /TN "Google Chrome Helper Update"
          4⤵
            PID:628
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C schtasks /CREATE /XML "C:\Users\Admin\AppData\Local\Temp\pA1.xml" /TN "Google Chrome Helper Update"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /CREATE /XML "C:\Users\Admin\AppData\Local\Temp\pA1.xml" /TN "Google Chrome Helper Update"
            4⤵
            • Creates scheduled task(s)
            PID:292
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      1⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:756
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1396
      • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
        1⤵
        • Loads dropped DLL
        • Enumerates system info in registry
        • Suspicious use of SetWindowsHookEx
        PID:1252

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      2
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      3
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe
        MD5

        f59685a74da27f107abd2212bb291af4

        SHA1

        2741e93fe708923a9634fc003207192e1fa81515

        SHA256

        2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

        SHA512

        86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

      • C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe
        MD5

        f59685a74da27f107abd2212bb291af4

        SHA1

        2741e93fe708923a9634fc003207192e1fa81515

        SHA256

        2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

        SHA512

        86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

      • C:\Program Files (x86)\Google Chrome Helper\update.dll
        MD5

        aaec25e4932912e9327696fcf44a513e

        SHA1

        51b5bb58cf195cc7fa781d53a4883c948c339d41

        SHA256

        f8023d85a9923810247feb245a0257bee3aa507f316bcca443bb4411637713b1

        SHA512

        45bbf35159f52a3db029cfab8e742b194194d066dd33a3f159004e248eabacc5c3720e6c2f37e4a4d3e58af7142162d02af579412f009de8b9e0c49a377c8754

      • C:\Users\Admin\AppData\Local\Temp\ALP2z.docm
        MD5

        9496073ea504163f93ecae5cf9eda5ab

        SHA1

        e1dd890e3390488407ea07bae6043d6079bdeb04

        SHA256

        633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

        SHA512

        f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

      • C:\Users\Admin\AppData\Local\Temp\QaEAX.xlsm
        MD5

        a9fdc9a36bdb93e518ec59ee54d42e2e

        SHA1

        aa522a435e5be442187a32bee5f2177dda2fdcc3

        SHA256

        2a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a

        SHA512

        79f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8

      • C:\Users\Admin\AppData\Local\Temp\SOr56.docm
        MD5

        d980ce52e04050bee86ce3178d3c5b1a

        SHA1

        1a43682893f93d2f2431cdd9f8dbb91199c6a2b6

        SHA256

        ee395d6795562f193cef1d55f87a49886a5be4cd3c7049b5957a1e983a20ea81

        SHA512

        3b14f07480124d3e024f272004b886bf391d1df78fc9f3d88423631f0082a7fce8f5ce678db3823857fb47d451f532cab626743d26bda7b0509717746a37e098

      • C:\Users\Admin\AppData\Local\Temp\SOr56.docm
        MD5

        9496073ea504163f93ecae5cf9eda5ab

        SHA1

        e1dd890e3390488407ea07bae6043d6079bdeb04

        SHA256

        633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

        SHA512

        f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

      • C:\Users\Admin\AppData\Local\Temp\ZcAmp.docm
        MD5

        9496073ea504163f93ecae5cf9eda5ab

        SHA1

        e1dd890e3390488407ea07bae6043d6079bdeb04

        SHA256

        633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

        SHA512

        f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

      • C:\Users\Admin\AppData\Local\Temp\ZcAmp.docm
        MD5

        f1a9015eb170973831930b8f0d9a015f

        SHA1

        b2c1c988f269bb202f6a0b9e2832e4b8f4ef4553

        SHA256

        e25426a1113660bd5438a89100ab88c1d5cc7ee91ed74d4103c19aeea931e261

        SHA512

        37765b299dc1eb0e124d02660b914a12c0180bf36454330285ecc8a2ed5f1f2afc8c6ac684d77e44fd4b4bd2fde0bf62687cc4458c2b3ea6d8339f3d187dc8b9

      • C:\Users\Admin\AppData\Local\Temp\fRiEP.docm
        MD5

        36ed76110331f23d37e2b62eecf17599

        SHA1

        9f3fd9edfa237bf284f6391b1071b50b9c55c06d

        SHA256

        d347c5457c968b395c535718211bdbfdd4b4a8a035f2f92efb62e4607574b6cb

        SHA512

        620b50270a0daff027c5cd797804d3e41b3ff16cf2677a4edb5d41ab673c3c8510abf6100d486dd2a98904e53db61c1ff1b82386eaab35992d16c5f84bc3e385

      • C:\Users\Admin\AppData\Local\Temp\fRiEP.docm
        MD5

        9496073ea504163f93ecae5cf9eda5ab

        SHA1

        e1dd890e3390488407ea07bae6043d6079bdeb04

        SHA256

        633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

        SHA512

        f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

      • C:\Users\Admin\AppData\Local\Temp\ldF8X.docm
        MD5

        9496073ea504163f93ecae5cf9eda5ab

        SHA1

        e1dd890e3390488407ea07bae6043d6079bdeb04

        SHA256

        633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

        SHA512

        f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

      • C:\Users\Admin\AppData\Local\Temp\ldF8X.docm
        MD5

        34149e6c75e496cc3ce6d60f4c8ee933

        SHA1

        23408e317a66eca93d797a2e87421b7385e98a65

        SHA256

        2df28c75378b19333b6ff7a697bdcde2405aa3c22b51accc04ec3aedcea16372

        SHA512

        499e6f6201dd2422ff42ce5763c7628044f6f5121ec12abd4b83f1c7f63b49f86b12547681161348458caaf07e643ad8869efec4c192b9b1b4d82706f7f37923

      • C:\Users\Admin\AppData\Local\Temp\mqUir.xlsm
        MD5

        96aa46077f7838150ad3ce843654eb92

        SHA1

        011fbf3b69a5cc6bce0526042604005766aad00a

        SHA256

        39ab431805c771ad81b9bc5e0f6a2aba7bbee747d8b02254e475b3a1b2f46117

        SHA512

        a9d2dc808842c51aa84928f225a2c4ad2e80512e9182ba93b96fab368a68e06230fd66a9ff38a8cbee18970c14a0914bbd45826c88e68f4793584d8153b8505e

      • C:\Users\Admin\AppData\Local\Temp\mqUir.xlsm
        MD5

        a9fdc9a36bdb93e518ec59ee54d42e2e

        SHA1

        aa522a435e5be442187a32bee5f2177dda2fdcc3

        SHA256

        2a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a

        SHA512

        79f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8

      • C:\Users\Admin\AppData\Local\Temp\not6H.docm
        MD5

        01b4ef6094fc2942601f2e89114328e5

        SHA1

        a2fb6f854bdaf34cb9458580254e0081903db1ff

        SHA256

        738a18b5387022b64e474bf8fa6468d9b33434f7937f4200f524cd088d4f2d01

        SHA512

        82d1bdb92ad4142562cdb395b66afea80437fc2bfa7067544dcc89d06e494af1af90b3809c8c29d5919be7c92e771229d782a404e598b8067e254a3321bac6bc

      • C:\Users\Admin\AppData\Local\Temp\not6H.docm
        MD5

        9496073ea504163f93ecae5cf9eda5ab

        SHA1

        e1dd890e3390488407ea07bae6043d6079bdeb04

        SHA256

        633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

        SHA512

        f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

      • C:\Users\Admin\AppData\Local\Temp\pA1.xml
        MD5

        d4a6c30fda3d2f86a28c11f21db1be50

        SHA1

        91ba5672247f48bbd4ca4daf35b17dd09ef5c6da

        SHA256

        2fd15bec9a1582b5d9f0214e73c31cd935417114eef6d21cfd768bc9e9a12f3e

        SHA512

        9b4de3b814e1b22c3d09599b333b3ab7e8b157e3f61007cfe347d88bba6aa666592393e9c73ae0449e155fd7a949f1eee9ef58d58a33cbb69fe4092158c2b21b

      • C:\Users\Admin\AppData\Local\Temp\wIG9u.docm
        MD5

        8df8dee0860eeaafaf754619464f8b3a

        SHA1

        9ba5a3a2b852aa4cf2b2fd94c4455524af989802

        SHA256

        8c86d0eeb2bab206af2a0671fd64ea2348f2663741957efea4c51a29120efa40

        SHA512

        dc8b9ed76e01500d3a3fb7417d5c62634f1a6bcdc450cede5e8fd488c0342f871cf624f98c55ca4ed74c3888b429df6406e4b72600b1dd93fdeb121a11348f18

      • C:\Users\Admin\AppData\Local\Temp\wIG9u.docm
        MD5

        9496073ea504163f93ecae5cf9eda5ab

        SHA1

        e1dd890e3390488407ea07bae6043d6079bdeb04

        SHA256

        633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

        SHA512

        f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
        MD5

        0952e8a3d8a15f363b884315618484e0

        SHA1

        8d6cd44f8bf941f89d031a82601f6cb67788c278

        SHA256

        218802e5b3b817ac20da648affd85791c49aa494cdd5a3fdb45f2e1eaf1acf50

        SHA512

        4dc05e1bad35cdc593028693294dae024f2fc20400ce7f370906117e91d383660a82e060936fc1b68f2a572b6b263eb5430eae89d073e4a27f71e99a4a31a7ad

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
        MD5

        a650f9f6a6f89e3f86d6b73fcd2e0355

        SHA1

        73439b3cb109dbb50c7032e9f18a7bb188e5f5a0

        SHA256

        b1afb5f1d8e9a3d48c4461d3bd28f3b615d94bf9bad49599107aba4ae627c84f

        SHA512

        bea7b91473d029e975ff83d22bad269154387832e27a23a7692ddee279fd5787331dea7bb66173235118d81ad8025460e9c5f6bab2f5e981b5bf7a3896e4f15f

      • \Program Files (x86)\Google Chrome Helper\chromehelper.exe
        MD5

        f59685a74da27f107abd2212bb291af4

        SHA1

        2741e93fe708923a9634fc003207192e1fa81515

        SHA256

        2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

        SHA512

        86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

      • \Program Files (x86)\Google Chrome Helper\chromehelper.exe
        MD5

        f59685a74da27f107abd2212bb291af4

        SHA1

        2741e93fe708923a9634fc003207192e1fa81515

        SHA256

        2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

        SHA512

        86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

      • \Program Files (x86)\Google Chrome Helper\chromehelper.exe
        MD5

        f59685a74da27f107abd2212bb291af4

        SHA1

        2741e93fe708923a9634fc003207192e1fa81515

        SHA256

        2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

        SHA512

        86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

      • \Program Files (x86)\Google Chrome Helper\chromehelper.exe
        MD5

        f59685a74da27f107abd2212bb291af4

        SHA1

        2741e93fe708923a9634fc003207192e1fa81515

        SHA256

        2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

        SHA512

        86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

      • \Program Files (x86)\Google Chrome Helper\update.dll
        MD5

        aaec25e4932912e9327696fcf44a513e

        SHA1

        51b5bb58cf195cc7fa781d53a4883c948c339d41

        SHA256

        f8023d85a9923810247feb245a0257bee3aa507f316bcca443bb4411637713b1

        SHA512

        45bbf35159f52a3db029cfab8e742b194194d066dd33a3f159004e248eabacc5c3720e6c2f37e4a4d3e58af7142162d02af579412f009de8b9e0c49a377c8754

      • \Program Files (x86)\Google Chrome Helper\update.dll
        MD5

        aaec25e4932912e9327696fcf44a513e

        SHA1

        51b5bb58cf195cc7fa781d53a4883c948c339d41

        SHA256

        f8023d85a9923810247feb245a0257bee3aa507f316bcca443bb4411637713b1

        SHA512

        45bbf35159f52a3db029cfab8e742b194194d066dd33a3f159004e248eabacc5c3720e6c2f37e4a4d3e58af7142162d02af579412f009de8b9e0c49a377c8754

      • \Program Files (x86)\Google Chrome Helper\update.dll
        MD5

        aaec25e4932912e9327696fcf44a513e

        SHA1

        51b5bb58cf195cc7fa781d53a4883c948c339d41

        SHA256

        f8023d85a9923810247feb245a0257bee3aa507f316bcca443bb4411637713b1

        SHA512

        45bbf35159f52a3db029cfab8e742b194194d066dd33a3f159004e248eabacc5c3720e6c2f37e4a4d3e58af7142162d02af579412f009de8b9e0c49a377c8754

      • memory/292-77-0x0000000000000000-mapping.dmp
      • memory/628-73-0x0000000000000000-mapping.dmp
      • memory/756-82-0x000000006FEC1000-0x000000006FEC3000-memory.dmp
        Filesize

        8KB

      • memory/756-81-0x0000000072441000-0x0000000072444000-memory.dmp
        Filesize

        12KB

      • memory/804-70-0x0000000000240000-0x0000000000241000-memory.dmp
        Filesize

        4KB

      • memory/804-63-0x0000000000000000-mapping.dmp
      • memory/1128-71-0x0000000000000000-mapping.dmp
      • memory/1252-91-0x000000002F1A1000-0x000000002F1A4000-memory.dmp
        Filesize

        12KB

      • memory/1396-97-0x000007FEFB891000-0x000007FEFB893000-memory.dmp
        Filesize

        8KB

      • memory/1396-96-0x0000000000000000-mapping.dmp
      • memory/1648-75-0x0000000000000000-mapping.dmp
      • memory/1944-60-0x00000000760B1000-0x00000000760B3000-memory.dmp
        Filesize

        8KB

      • memory/1944-61-0x00000000001D0000-0x00000000001D1000-memory.dmp
        Filesize

        4KB