Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    09-05-2021 16:45

General

  • Target

    971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd.exe

  • Size

    13.2MB

  • MD5

    9632b1f804ec7e7e67f16d6395574ede

  • SHA1

    5b3747e53335523cdc2305f83a7fa803d969f72b

  • SHA256

    971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd

  • SHA512

    21cbd99c9b727824dc855a3198826c828300b2d36409b8ed0c9a52c2a11ea7b3fdcad37c4244f4e6957fd0d269f40566e218e982d4ea8fb4f88d03e3845c8ba0

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd.exe
    "C:\Users\Admin\AppData\Local\Temp\971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\AppData\Local\Temp\._cache_971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://memoryhackers.org/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1176 CREDAT:275457 /prefetch:2
          4⤵
            PID:1808
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://memoryhackers.org/konular/memoryhackers-loader-guncellemesi-indirme-linkleri-loader-updated.56267/
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:960
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:960 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1732
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        2⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:1752
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      1⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:896

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    2
    T1082

    Query Registry

    1
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      af4f848c5d2fd90c5e0d81d7672497b9

      SHA1

      153669eb359603d17b1872422057a2cb4c0934d6

      SHA256

      6c7dee509814ac1779f7bd29cc3f504b7b4e50cdc136324add91e748ce971530

      SHA512

      cb672b273a6594ec75730ea6e1cf3105781cb8fffcde8b2dbd77d79e04ae0a0a6ba971cdbe8dc47a5b552fe0dbb58557346f751808eae9f5d7edd2acbf3c28b4

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      af4f848c5d2fd90c5e0d81d7672497b9

      SHA1

      153669eb359603d17b1872422057a2cb4c0934d6

      SHA256

      6c7dee509814ac1779f7bd29cc3f504b7b4e50cdc136324add91e748ce971530

      SHA512

      cb672b273a6594ec75730ea6e1cf3105781cb8fffcde8b2dbd77d79e04ae0a0a6ba971cdbe8dc47a5b552fe0dbb58557346f751808eae9f5d7edd2acbf3c28b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      MD5

      15775d95513782f99cdfb17e65dfceb1

      SHA1

      6c11f8bee799b093f9ff4841e31041b081b23388

      SHA256

      477a9559194edf48848fce59e05105168745a46bdc0871ea742a2588ca9fbe00

      SHA512

      ac09ce01122d7a837bd70277badd58ff71d8c5335f8fc599d5e3ed42c8fee2108dd043bce562c82ba12a81b9b08bd24b961c0961bf8fd3a0b8341c87483cd1e7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      a7650b24df52b0bbe2da6a470b779309

      SHA1

      c5aa5141f978a46b5b8ddff1c50cf5f47dfaf0f8

      SHA256

      df9c92491c0a2f3b4da344fcbe87c4fcefb15089ddf0422daa1656bb86d8b550

      SHA512

      1a8712bf2a60d105542117c5fe37c1176bcc80d81f8c798f778b20873b5bd39910f2ca31145aed24c056cedd79bdf68e543bfd325d0fcb1f415674e9ef456787

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      a7650b24df52b0bbe2da6a470b779309

      SHA1

      c5aa5141f978a46b5b8ddff1c50cf5f47dfaf0f8

      SHA256

      df9c92491c0a2f3b4da344fcbe87c4fcefb15089ddf0422daa1656bb86d8b550

      SHA512

      1a8712bf2a60d105542117c5fe37c1176bcc80d81f8c798f778b20873b5bd39910f2ca31145aed24c056cedd79bdf68e543bfd325d0fcb1f415674e9ef456787

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      MD5

      3da465cc4fafcaf001a2fcfc2171eae8

      SHA1

      c8103200f4eb684d4874d3e32ccbe1bc6e9c1c98

      SHA256

      1c2e544b27086f55770b82ea9050b0291d6d129f469195be886b593d8b7b84e3

      SHA512

      062c12676570248bbc1de8b22e9c250cf72ca7e50803cb081e695c6475fb5c48ca4e17d6d5d88aca6b29adddbb3378d6b0a33286b992d389d5bd2cf70380c72e

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3111B8E1-B0F6-11EB-9117-4E8833708825}.dat
      MD5

      969e7e64fab55fe688baedfad1bd21ca

      SHA1

      3457836c85f9a179d622d28f60a4d89d35f134d0

      SHA256

      ee855d9c63d8e31005e491a2aee20e66b943673c24726a26d608a3fbeabddae1

      SHA512

      d29f9d4143cf6c9a693432a777cc51601d1463c00ade43bd998c34448af01de06cd9e976be60487b0bf96a81f8ef4cb49821b9d0286cf20d43a30beb20b8c014

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{311B3E61-B0F6-11EB-9117-4E8833708825}.dat
      MD5

      7574df1fcdd62a6e2f9d85c2957d3b9e

      SHA1

      e90fd9e4e029ca923619926a3a5bd1269f0dfe9b

      SHA256

      2955916cf9383cb9fc8aed8364dcbc2be5ef13c0513212eaecf13eb537f29d9c

      SHA512

      3008323448bc9d6fe1f2beef1cab990893793e05386a8e592e15b81b321ab24a12693c8634fdfa1bbdc8d268f353835014118d08bd2a4da3b96e776563788085

    • C:\Users\Admin\AppData\Local\Temp\._cache_971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd.exe
      MD5

      88cd3369ceb3a4e22fd54a852fd4258d

      SHA1

      18a7e0eb41eb6dbf9314a7f472d4d60210142e5f

      SHA256

      f0fd284e05d346eebec8c3aa8640edf2e1e7e1f45d7a28af23719b1a8b925c85

      SHA512

      eec7aed2168ca929e8455e76a64082bb545145e37d84dd173eb5500f16ab8cd29724f27344d6cf49f6fcc0e0428a6936af55603f34ca8f4f46c693415cc8d63a

    • C:\Users\Admin\AppData\Local\Temp\._cache_971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd.exe
      MD5

      88cd3369ceb3a4e22fd54a852fd4258d

      SHA1

      18a7e0eb41eb6dbf9314a7f472d4d60210142e5f

      SHA256

      f0fd284e05d346eebec8c3aa8640edf2e1e7e1f45d7a28af23719b1a8b925c85

      SHA512

      eec7aed2168ca929e8455e76a64082bb545145e37d84dd173eb5500f16ab8cd29724f27344d6cf49f6fcc0e0428a6936af55603f34ca8f4f46c693415cc8d63a

    • C:\Users\Admin\AppData\Local\Temp\11wGwYKA.xlsm
      MD5

      e566fc53051035e1e6fd0ed1823de0f9

      SHA1

      00bc96c48b98676ecd67e81a6f1d7754e4156044

      SHA256

      8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

      SHA512

      a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2M71UJE6.txt
      MD5

      cfefb9371ea43df872bdbed9e94a7a9e

      SHA1

      bfdf931091e68b7cce79b9807e7fcff3fe439806

      SHA256

      b25c9fee09386eae18c5afadaee0222a5432149369b2032a2a710e25367ea228

      SHA512

      e3d3e4a1e9b5833c208e9e329957611595adb2e853c64f8298c3f5e581fde6467b4dc899b213fd5bd73ecdfce106ea4d8515e7da844c1e49ae5d720fca20850f

    • \ProgramData\Synaptics\Synaptics.exe
      MD5

      af4f848c5d2fd90c5e0d81d7672497b9

      SHA1

      153669eb359603d17b1872422057a2cb4c0934d6

      SHA256

      6c7dee509814ac1779f7bd29cc3f504b7b4e50cdc136324add91e748ce971530

      SHA512

      cb672b273a6594ec75730ea6e1cf3105781cb8fffcde8b2dbd77d79e04ae0a0a6ba971cdbe8dc47a5b552fe0dbb58557346f751808eae9f5d7edd2acbf3c28b4

    • \ProgramData\Synaptics\Synaptics.exe
      MD5

      af4f848c5d2fd90c5e0d81d7672497b9

      SHA1

      153669eb359603d17b1872422057a2cb4c0934d6

      SHA256

      6c7dee509814ac1779f7bd29cc3f504b7b4e50cdc136324add91e748ce971530

      SHA512

      cb672b273a6594ec75730ea6e1cf3105781cb8fffcde8b2dbd77d79e04ae0a0a6ba971cdbe8dc47a5b552fe0dbb58557346f751808eae9f5d7edd2acbf3c28b4

    • \Users\Admin\AppData\Local\Temp\._cache_971b5e84c8f1244ecee167dbce3b0007fb988c5676d6fae10c2dd2d1b85454bd.exe
      MD5

      88cd3369ceb3a4e22fd54a852fd4258d

      SHA1

      18a7e0eb41eb6dbf9314a7f472d4d60210142e5f

      SHA256

      f0fd284e05d346eebec8c3aa8640edf2e1e7e1f45d7a28af23719b1a8b925c85

      SHA512

      eec7aed2168ca929e8455e76a64082bb545145e37d84dd173eb5500f16ab8cd29724f27344d6cf49f6fcc0e0428a6936af55603f34ca8f4f46c693415cc8d63a

    • memory/368-61-0x0000000000220000-0x0000000000221000-memory.dmp
      Filesize

      4KB

    • memory/368-60-0x0000000076661000-0x0000000076663000-memory.dmp
      Filesize

      8KB

    • memory/896-79-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/896-73-0x000000002F261000-0x000000002F264000-memory.dmp
      Filesize

      12KB

    • memory/896-77-0x0000000071671000-0x0000000071673000-memory.dmp
      Filesize

      8KB

    • memory/960-84-0x000007FEFBDC1000-0x000007FEFBDC3000-memory.dmp
      Filesize

      8KB

    • memory/960-83-0x0000000000000000-mapping.dmp
    • memory/1176-82-0x0000000000000000-mapping.dmp
    • memory/1732-86-0x0000000000000000-mapping.dmp
    • memory/1752-69-0x0000000000000000-mapping.dmp
    • memory/1752-72-0x00000000001C0000-0x00000000001C1000-memory.dmp
      Filesize

      4KB

    • memory/1808-85-0x0000000000000000-mapping.dmp
    • memory/1808-88-0x0000000000D90000-0x0000000000D92000-memory.dmp
      Filesize

      8KB

    • memory/1812-76-0x0000000000400000-0x0000000001EDE000-memory.dmp
      Filesize

      26.9MB

    • memory/1812-74-0x00000000001C0000-0x00000000001C1000-memory.dmp
      Filesize

      4KB

    • memory/1812-75-0x0000000000250000-0x0000000000251000-memory.dmp
      Filesize

      4KB

    • memory/1812-63-0x0000000000000000-mapping.dmp