Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    08-05-2021 21:55

General

  • Target

    9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

  • Size

    1008KB

  • MD5

    01cbb89115b29a90c1c0aa7dc59e9bd8

  • SHA1

    55be68a696d07e9d9b081291ea0985dd6b170ee7

  • SHA256

    9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50

  • SHA512

    394bee45120025b4d0670e78886c17aa825b1409600a04e9efda838fb43491f219f98376efd34a1962c5e4403a09a0da97c670851fbd08eb25b6c22393703a4b

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe
    "C:\Users\Admin\AppData\Local\Temp\9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Users\Admin\AppData\Local\Temp\9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe
        "C:\Users\Admin\AppData\Local\Temp\9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:1676
          • C:\Windows\svchost.exe
            "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1536
            • C:\Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe
              "C:\Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:1504
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:1668
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    PID:1072

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    MD5

    af4f848c5d2fd90c5e0d81d7672497b9

    SHA1

    153669eb359603d17b1872422057a2cb4c0934d6

    SHA256

    6c7dee509814ac1779f7bd29cc3f504b7b4e50cdc136324add91e748ce971530

    SHA512

    cb672b273a6594ec75730ea6e1cf3105781cb8fffcde8b2dbd77d79e04ae0a0a6ba971cdbe8dc47a5b552fe0dbb58557346f751808eae9f5d7edd2acbf3c28b4

  • C:\Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    4e751362b15d1fdbfb4bb5be44cbd9d4

    SHA1

    87943541a8187d5ba01673e0e7b7ce710170ce7c

    SHA256

    005a65ea3f68e15324943d6b1437ae4d89661d9affcb1ccb74fcb8097bc6d983

    SHA512

    43410a96ec8ed1f3d799e3f44a492b516132a6881335625c22562ec6aaae34bd15525f6a3755350f7816784574adcb6a049d672cf79d7b586ea5ac6ed93f0347

  • C:\Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    4e751362b15d1fdbfb4bb5be44cbd9d4

    SHA1

    87943541a8187d5ba01673e0e7b7ce710170ce7c

    SHA256

    005a65ea3f68e15324943d6b1437ae4d89661d9affcb1ccb74fcb8097bc6d983

    SHA512

    43410a96ec8ed1f3d799e3f44a492b516132a6881335625c22562ec6aaae34bd15525f6a3755350f7816784574adcb6a049d672cf79d7b586ea5ac6ed93f0347

  • C:\Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    c0075e9686f93e19ace48b2866a569a7

    SHA1

    62597c582448dcd9a4110cefbee0c1a3df011870

    SHA256

    395554963b62f584dc74000ea83ad5b1efc79e4b1b6946e708c2588eeee0d9a0

    SHA512

    4839cf800fd47ef07cac585014ea985b20d6dac0fde698c2c9f70cc6298c93bcecce2a5c6f42c8f2e59dde39967626719006f022edf6111c2f34668f015e49f6

  • C:\Users\Admin\AppData\Local\Temp\9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    f99927aaee8ad779afa33e44c8335b9e

    SHA1

    8c6a611f61e5b6656660e75b7596b095cf479912

    SHA256

    faf45da59f913c73fb3ca359c304ec54894ecd37d87a87e8c138cfeff10a2d56

    SHA512

    0e3158418090362cb36b74aa2cfe5d0e0dc70ea89fa067c1339db0720a4361cc21c26dcb43a3a25dc1d6ab2d118146fa94078eb566c5808dc76d1a260c58bd24

  • C:\Users\Admin\AppData\Local\Temp\9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    f99927aaee8ad779afa33e44c8335b9e

    SHA1

    8c6a611f61e5b6656660e75b7596b095cf479912

    SHA256

    faf45da59f913c73fb3ca359c304ec54894ecd37d87a87e8c138cfeff10a2d56

    SHA512

    0e3158418090362cb36b74aa2cfe5d0e0dc70ea89fa067c1339db0720a4361cc21c26dcb43a3a25dc1d6ab2d118146fa94078eb566c5808dc76d1a260c58bd24

  • C:\Windows\svchost.exe

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • \ProgramData\Synaptics\Synaptics.exe

    MD5

    af4f848c5d2fd90c5e0d81d7672497b9

    SHA1

    153669eb359603d17b1872422057a2cb4c0934d6

    SHA256

    6c7dee509814ac1779f7bd29cc3f504b7b4e50cdc136324add91e748ce971530

    SHA512

    cb672b273a6594ec75730ea6e1cf3105781cb8fffcde8b2dbd77d79e04ae0a0a6ba971cdbe8dc47a5b552fe0dbb58557346f751808eae9f5d7edd2acbf3c28b4

  • \ProgramData\Synaptics\Synaptics.exe

    MD5

    af4f848c5d2fd90c5e0d81d7672497b9

    SHA1

    153669eb359603d17b1872422057a2cb4c0934d6

    SHA256

    6c7dee509814ac1779f7bd29cc3f504b7b4e50cdc136324add91e748ce971530

    SHA512

    cb672b273a6594ec75730ea6e1cf3105781cb8fffcde8b2dbd77d79e04ae0a0a6ba971cdbe8dc47a5b552fe0dbb58557346f751808eae9f5d7edd2acbf3c28b4

  • \Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    4e751362b15d1fdbfb4bb5be44cbd9d4

    SHA1

    87943541a8187d5ba01673e0e7b7ce710170ce7c

    SHA256

    005a65ea3f68e15324943d6b1437ae4d89661d9affcb1ccb74fcb8097bc6d983

    SHA512

    43410a96ec8ed1f3d799e3f44a492b516132a6881335625c22562ec6aaae34bd15525f6a3755350f7816784574adcb6a049d672cf79d7b586ea5ac6ed93f0347

  • \Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    4e751362b15d1fdbfb4bb5be44cbd9d4

    SHA1

    87943541a8187d5ba01673e0e7b7ce710170ce7c

    SHA256

    005a65ea3f68e15324943d6b1437ae4d89661d9affcb1ccb74fcb8097bc6d983

    SHA512

    43410a96ec8ed1f3d799e3f44a492b516132a6881335625c22562ec6aaae34bd15525f6a3755350f7816784574adcb6a049d672cf79d7b586ea5ac6ed93f0347

  • \Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    c0075e9686f93e19ace48b2866a569a7

    SHA1

    62597c582448dcd9a4110cefbee0c1a3df011870

    SHA256

    395554963b62f584dc74000ea83ad5b1efc79e4b1b6946e708c2588eeee0d9a0

    SHA512

    4839cf800fd47ef07cac585014ea985b20d6dac0fde698c2c9f70cc6298c93bcecce2a5c6f42c8f2e59dde39967626719006f022edf6111c2f34668f015e49f6

  • \Users\Admin\AppData\Local\Temp\._cache_9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    c0075e9686f93e19ace48b2866a569a7

    SHA1

    62597c582448dcd9a4110cefbee0c1a3df011870

    SHA256

    395554963b62f584dc74000ea83ad5b1efc79e4b1b6946e708c2588eeee0d9a0

    SHA512

    4839cf800fd47ef07cac585014ea985b20d6dac0fde698c2c9f70cc6298c93bcecce2a5c6f42c8f2e59dde39967626719006f022edf6111c2f34668f015e49f6

  • \Users\Admin\AppData\Local\Temp\9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    f99927aaee8ad779afa33e44c8335b9e

    SHA1

    8c6a611f61e5b6656660e75b7596b095cf479912

    SHA256

    faf45da59f913c73fb3ca359c304ec54894ecd37d87a87e8c138cfeff10a2d56

    SHA512

    0e3158418090362cb36b74aa2cfe5d0e0dc70ea89fa067c1339db0720a4361cc21c26dcb43a3a25dc1d6ab2d118146fa94078eb566c5808dc76d1a260c58bd24

  • \Users\Admin\AppData\Local\Temp\9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    f99927aaee8ad779afa33e44c8335b9e

    SHA1

    8c6a611f61e5b6656660e75b7596b095cf479912

    SHA256

    faf45da59f913c73fb3ca359c304ec54894ecd37d87a87e8c138cfeff10a2d56

    SHA512

    0e3158418090362cb36b74aa2cfe5d0e0dc70ea89fa067c1339db0720a4361cc21c26dcb43a3a25dc1d6ab2d118146fa94078eb566c5808dc76d1a260c58bd24

  • \Users\Admin\AppData\Local\Temp\9582180cbf98031830a01e930edf7afd2310b300c3aa8f23f4e7af4083e9ba50.exe

    MD5

    f99927aaee8ad779afa33e44c8335b9e

    SHA1

    8c6a611f61e5b6656660e75b7596b095cf479912

    SHA256

    faf45da59f913c73fb3ca359c304ec54894ecd37d87a87e8c138cfeff10a2d56

    SHA512

    0e3158418090362cb36b74aa2cfe5d0e0dc70ea89fa067c1339db0720a4361cc21c26dcb43a3a25dc1d6ab2d118146fa94078eb566c5808dc76d1a260c58bd24

  • memory/1052-59-0x0000000000000000-mapping.dmp

  • memory/1504-80-0x0000000000000000-mapping.dmp

  • memory/1536-76-0x0000000000000000-mapping.dmp

  • memory/1668-85-0x0000000000000000-mapping.dmp

  • memory/1668-88-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1676-73-0x0000000000000000-mapping.dmp

  • memory/2036-66-0x00000000766D1000-0x00000000766D3000-memory.dmp

    Filesize

    8KB

  • memory/2036-68-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2036-64-0x0000000000000000-mapping.dmp