Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    08-05-2021 22:40

General

  • Target

    2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd.exe

  • Size

    722KB

  • MD5

    f59685a74da27f107abd2212bb291af4

  • SHA1

    2741e93fe708923a9634fc003207192e1fa81515

  • SHA256

    2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

  • SHA512

    86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious Office macro 16 IoCs

    Office document equipped with macros.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 57 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd.exe
    "C:\Users\Admin\AppData\Local\Temp\2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe
      "C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C schtasks /QUERY /TN "Google Chrome Helper Update"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /QUERY /TN "Google Chrome Helper Update"
          4⤵
            PID:1468
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C schtasks /CREATE /XML "C:\Users\Admin\AppData\Local\Temp\VUJ.xml" /TN "Google Chrome Helper Update"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1252
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /CREATE /XML "C:\Users\Admin\AppData\Local\Temp\VUJ.xml" /TN "Google Chrome Helper Update"
            4⤵
            • Creates scheduled task(s)
            PID:1612
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3888
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      PID:3556

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    Query Registry

    3
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    4
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe
      MD5

      f59685a74da27f107abd2212bb291af4

      SHA1

      2741e93fe708923a9634fc003207192e1fa81515

      SHA256

      2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

      SHA512

      86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

    • C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe
      MD5

      f59685a74da27f107abd2212bb291af4

      SHA1

      2741e93fe708923a9634fc003207192e1fa81515

      SHA256

      2d10f51c3eacdf5fb277c2a0f4d92ea9e9d89c0f781414e9f0c0b9381a1eb7fd

      SHA512

      86ce3f50b70b8768ea8051ddee0c477620bdbad54ee883cc2cbd8851060b9cb1afbbdf90b551870ef02306d41d19d2ce79e8751c04fac3b1f7eecda6c653ce33

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
      MD5

      ac972c540ae23d883d89a30ece42da56

      SHA1

      ade92951a171013e540b24e8860f9839fd7d364b

      SHA256

      85b6c09a2ebbd4327295785baeebf3d76d6ab1f1424ff10f297d8e1c33fde9df

      SHA512

      561f83d02a9af53d13c97278c22ac56cb31df09ee7eb0df49bca38a3d696a4ba47c5613885202d2f352293da6d2ea5836165cdeb1f0e2e64c4d9e99444aa41dd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
      MD5

      4c2b0756db7d85797865f127b7699a3a

      SHA1

      17a77b98039722b26d4ea673c62b28dd39fb5bb7

      SHA256

      b51f779e271223e5c642c12d00331e67c5fd545daa0d96ae89c7b42a4cc3c81f

      SHA512

      52e81bb92a0b2b8a63d9d5f58b50607a8fed6aca1be763871ddd92db691d7087fdf41ee8504bd1d0dab07a5cca00b89a0e144b374a08b4829a0d5b8efe709594

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\4C124BE7-E421-4234-9E4B-55D64C850BD3
      MD5

      24d6698b1fd7bb820bcabae18651e6a9

      SHA1

      5aeeb3f34efa434553abe523b7872d506d842bb9

      SHA256

      c8b2d8874a31809a6407c06aeee3ddbfd31909f7e3cab453870879420d76f3f0

      SHA512

      a6b56f20706698a5961f481f54f0d2c8eec2f0cc9a99af980be9ac0f85e2aa016070b961a9e1a5609a68e178d2195c36cda4d70eabbc503e52d100be813cf16c

    • C:\Users\Admin\AppData\Local\Temp\1pnFU.xlsm
      MD5

      a9fdc9a36bdb93e518ec59ee54d42e2e

      SHA1

      aa522a435e5be442187a32bee5f2177dda2fdcc3

      SHA256

      2a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a

      SHA512

      79f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8

    • C:\Users\Admin\AppData\Local\Temp\AaeRd.docm
      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\B85Jb.docm
      MD5

      947b61ed03784c915a00be855bcf30d1

      SHA1

      4f85dbcda273bd19c4a66029b8309353f411b899

      SHA256

      0fed395c4f9f3d70bfd8f8ce533fefa35589eef608ea948c2faa6a6fae059621

      SHA512

      1e749bfae44ed943935d8125c19747962803c170ad3497108b6ee812e16f9f6196191bbb697e6902da56370430ed0a0a8051114f077d91349b662f4c5c81d867

    • C:\Users\Admin\AppData\Local\Temp\B85Jb.docm
      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\FNV9Z.docm
      MD5

      33c0ca3b8b61a050d694c299e707b627

      SHA1

      38e642458c78f392ee7f89799ad558b0cbfce66d

      SHA256

      13a1babe3865488f7e1eee78bf03e31daae23a7f985cd1588f7ae3b4b828ec25

      SHA512

      51bb8729dcd115bd45436ef9edf0fd4239b6397863c7b68effdc4d8d15eb14b64d2c9b1c125f434fc9cf80924e515980ed9af509e9c7455b07869e117cd0981b

    • C:\Users\Admin\AppData\Local\Temp\FNV9Z.docm
      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\PMYU9.docm
      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\PMYU9.docm
      MD5

      53f6ee094adc59f8e296caf1022b938f

      SHA1

      fe53a044783e1cba8896e005db937bb2ed3a4dbe

      SHA256

      cc4e9e24b0c8d81af463e5e528b1796e558ef621b8124f9aeb837cae2834e7f0

      SHA512

      131fc9859e0aba484060f73f3c7827c5ba93418a900923ad9263aee5c935007bee9a8a78da765d4ccf026f849302a9b5564de3e1eaecfbdff176562c33d75f36

    • C:\Users\Admin\AppData\Local\Temp\VUJ.xml
      MD5

      d4a6c30fda3d2f86a28c11f21db1be50

      SHA1

      91ba5672247f48bbd4ca4daf35b17dd09ef5c6da

      SHA256

      2fd15bec9a1582b5d9f0214e73c31cd935417114eef6d21cfd768bc9e9a12f3e

      SHA512

      9b4de3b814e1b22c3d09599b333b3ab7e8b157e3f61007cfe347d88bba6aa666592393e9c73ae0449e155fd7a949f1eee9ef58d58a33cbb69fe4092158c2b21b

    • C:\Users\Admin\AppData\Local\Temp\Y9nUp.docm
      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\f1wLx.docm
      MD5

      306f09ee5985c58878a01e7259915025

      SHA1

      cc573d926d3b0dae49d65b5d025adc1119f757ae

      SHA256

      be45f0a2b0ab660e6f00a48bdd17000db8981dc885687dbd96d5b750e54236b8

      SHA512

      9e617f8ff9621d536057dc5f88816f153380bf3066070488e1891b70eb490d8b5708aea01fe0a1f1bca13b5bd35d3ceed3ea7d06076ddf66a371954fc1103dd5

    • C:\Users\Admin\AppData\Local\Temp\f1wLx.docm
      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\kQcFq.xlsm
      MD5

      972c9123bf1dd78d02ad8fb8d1fd8174

      SHA1

      cac2d250cab7ec25fd6bed5b2f91a90c82e66d24

      SHA256

      5df5e53cd4076638a7141eee0e237bfce9c73753406fe0b6d2601d5201f82b1c

      SHA512

      f1b9513d0daa80aa26409142901823b7ac5c867a92a226fe1264d5932d529a16378fb5cb707b8bfe5b0050dfa4d64c37e91df0fe98f1ad2537b54edf734c57d3

    • C:\Users\Admin\AppData\Local\Temp\kQcFq.xlsm
      MD5

      a9fdc9a36bdb93e518ec59ee54d42e2e

      SHA1

      aa522a435e5be442187a32bee5f2177dda2fdcc3

      SHA256

      2a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a

      SHA512

      79f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8

    • C:\Users\Admin\AppData\Local\Temp\mLIAx.docm
      MD5

      5e3361ab1e8dccb0ab135cc4b5751b8f

      SHA1

      c8a44a9c1e222f50f4ba6821212983b50434a38b

      SHA256

      b096d723ec8a88086347f4817bb301f0d6bfcd79547bab7e34f5e5ebaeb89b85

      SHA512

      ec07f959e95c06c925ddfbfa2a0dc82452fd1127f30f318710b9f0cacde7bd7d0ef5f72be9d9cc1436116de7ec398b762af04419d80030b3ebc618e43cc34763

    • C:\Users\Admin\AppData\Local\Temp\mLIAx.docm
      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\uRmga.docm
      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\wrOTa.docm
      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\wrOTa.docm
      MD5

      0688d5c9e90cee2711941bba95e16c93

      SHA1

      3a859ff9a44ec5b9e51e0e711680162bec33f84c

      SHA256

      3269edb754186dc25203ce260e2cc0db8eefd1b5b61ea9cf432d891715e24a89

      SHA512

      fdc618df4c80ed278236a9c7f97d65c2c3040415a013ad30fb61c51040d4c1abaa1a165d59580c2c3bf7bd84c5bd45f9df3ec52e6b98cff93fd8076b4aa89851

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      MD5

      7fd514f59aa220068a7dd2db234a9130

      SHA1

      e427602741430b7719479e4408bf0f614e0041db

      SHA256

      21e9525286bbee74d8868834eacf6e10fc2e33e4867481da9fb3b991a04a4da9

      SHA512

      01ac4b87cfcaef79b149bcdf15dd857d041ccf410901458c6767d8b9aba1598ff745d8a57c31ad6205e8e256b5ac665a571fcd3b2b79c4787e5d78af84085487

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      MD5

      8748175b3ec8391ba9f161ccdfcd715a

      SHA1

      ca322d2ce3d859b36cb410f56930ef5de3cfe739

      SHA256

      29dbcd88e197b659506fc07e2c6f6de07830bdd4122483e2786353ffd0e1da6b

      SHA512

      f669db23354e680f8a954b4b0fb1ee9f6e13385381388e781d25737e8c4a66c6b82056d284d729325428ab8bb2b972856d440576d28b908f3210b2676b2aa0cb

    • memory/1248-119-0x0000000000000000-mapping.dmp
    • memory/1252-121-0x0000000000000000-mapping.dmp
    • memory/1468-120-0x0000000000000000-mapping.dmp
    • memory/1612-122-0x0000000000000000-mapping.dmp
    • memory/3452-118-0x00000000004D0000-0x000000000061A000-memory.dmp
      Filesize

      1.3MB

    • memory/3452-115-0x0000000000000000-mapping.dmp
    • memory/3888-132-0x00007FFA23180000-0x00007FFA2426E000-memory.dmp
      Filesize

      16.9MB

    • memory/3888-127-0x00007FFA08250000-0x00007FFA08260000-memory.dmp
      Filesize

      64KB

    • memory/3888-126-0x00007FFA08250000-0x00007FFA08260000-memory.dmp
      Filesize

      64KB

    • memory/3888-125-0x00007FFA08250000-0x00007FFA08260000-memory.dmp
      Filesize

      64KB

    • memory/3888-124-0x00007FFA08250000-0x00007FFA08260000-memory.dmp
      Filesize

      64KB

    • memory/3888-129-0x00007FFA08250000-0x00007FFA08260000-memory.dmp
      Filesize

      64KB

    • memory/3888-128-0x00007FFA29470000-0x00007FFA2BF93000-memory.dmp
      Filesize

      43.1MB

    • memory/3888-133-0x00007FFA21280000-0x00007FFA23175000-memory.dmp
      Filesize

      31.0MB

    • memory/3896-114-0x0000000000610000-0x000000000075A000-memory.dmp
      Filesize

      1.3MB