Analysis

  • max time kernel
    130s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    09-05-2021 17:39

General

  • Target

    b1637f5279b2f5047ed81d5af27ba280cbeffe351e0818689b824ebea3c6119a.exe

  • Size

    11.1MB

  • MD5

    5fabfcfdd5b433c8bc1d5fa82ba9c7d1

  • SHA1

    6ecfc1bb1278f642893085b6f6d3f480d3ccbc68

  • SHA256

    b1637f5279b2f5047ed81d5af27ba280cbeffe351e0818689b824ebea3c6119a

  • SHA512

    bb4318e4f7b2e8f3b9b388e97abceee30cfa7f47477d1416c7af561a2637a7c77e4ddee628aca616e986f0741bace86c1791198345b6f4123646b725632663d3

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 13 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 11 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1637f5279b2f5047ed81d5af27ba280cbeffe351e0818689b824ebea3c6119a.exe
    "C:\Users\Admin\AppData\Local\Temp\b1637f5279b2f5047ed81d5af27ba280cbeffe351e0818689b824ebea3c6119a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\._cache_b1637f5279b2f5047ed81d5af27ba280cbeffe351e0818689b824ebea3c6119a.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_b1637f5279b2f5047ed81d5af27ba280cbeffe351e0818689b824ebea3c6119a.exe"
      2⤵
      • Executes dropped EXE
      • Checks for any installed AV software in registry
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Windows\Temp\asw.366b87c71232dbfd\instup.exe
        "C:\Windows\Temp\asw.366b87c71232dbfd\instup.exe" /sfx:clear /sfxstorage:C:\Windows\Temp\asw.366b87c71232dbfd /prod:ais /wait
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks for any installed AV software in registry
        • Writes to the Master Boot Record (MBR)
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2232
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2836
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Avast Software\Persistent Data\Avast\Logs\Clear.log

    MD5

    445079d6133e727711fcf6b49b808c25

    SHA1

    bd836fd36f8287fadad2a6558cf156fe2261c4b3

    SHA256

    5f4df4732cd8c867ac5a140cbf5dc7d47f4ef6f73e7ce4d3f7857b4c41bc39bf

    SHA512

    17becc45f303078ef1af776c05da7a6d5157739d7cc013a52639211eb0110c3120caea10ccfc1215a61c5e3495f56d9a77f7ad9d38ee3360cef9e572bf655bf3

  • C:\ProgramData\Synaptics\Synaptics.exe

    MD5

    f47ba21a0625905bd2ce98bfd92825ce

    SHA1

    b744ef5b7edbde6536f3d5928f9efe57581fcbb2

    SHA256

    21e714286bc85aab5db3cf9e77c589bbed5f05dbc36a2281a90b4a550fae2c09

    SHA512

    b6608758c9c6b969b47edbe9338170b5011956d69d5475ebe93c62e0c3615bb580a9f979003741f3caa4642cf69a2d3fab511656a27b49c73c565c84a6b817d9

  • C:\ProgramData\Synaptics\Synaptics.exe

    MD5

    f47ba21a0625905bd2ce98bfd92825ce

    SHA1

    b744ef5b7edbde6536f3d5928f9efe57581fcbb2

    SHA256

    21e714286bc85aab5db3cf9e77c589bbed5f05dbc36a2281a90b4a550fae2c09

    SHA512

    b6608758c9c6b969b47edbe9338170b5011956d69d5475ebe93c62e0c3615bb580a9f979003741f3caa4642cf69a2d3fab511656a27b49c73c565c84a6b817d9

  • C:\Users\Admin\AppData\Local\Temp\._cache_b1637f5279b2f5047ed81d5af27ba280cbeffe351e0818689b824ebea3c6119a.exe

    MD5

    dddd3e327c5b6f05c4529caa92899487

    SHA1

    2e622ad7a96b22756e93ebd1efa9225789ea559e

    SHA256

    e1b6fe3a3b3bfc9227f77aa5b8cfbf49452ab1db0e8f2fe0d4cb9f87c22df847

    SHA512

    95a3442de2ae55b450282b6be25444c9a48f17478d8374ee4f9743929d30344d01ee61c4c67f8c7a94d887dd2a1fa5a120f58b734d319b7e7801bfc8c8a401b1

  • C:\Users\Admin\AppData\Local\Temp\._cache_b1637f5279b2f5047ed81d5af27ba280cbeffe351e0818689b824ebea3c6119a.exe

    MD5

    dddd3e327c5b6f05c4529caa92899487

    SHA1

    2e622ad7a96b22756e93ebd1efa9225789ea559e

    SHA256

    e1b6fe3a3b3bfc9227f77aa5b8cfbf49452ab1db0e8f2fe0d4cb9f87c22df847

    SHA512

    95a3442de2ae55b450282b6be25444c9a48f17478d8374ee4f9743929d30344d01ee61c4c67f8c7a94d887dd2a1fa5a120f58b734d319b7e7801bfc8c8a401b1

  • C:\Users\Admin\AppData\Local\Temp\8WODOcx9.xlsm

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Windows\Temp\asw.366b87c71232dbfd\HTMLayout.dll

    MD5

    6eea70d78095cab4151b4b9f398713f5

    SHA1

    0014bf3c6cd2b9ef25830c55ef43da968624cc9f

    SHA256

    f352459d5eef739bd708b710a7c525bda51941a70711629157aaaaeb92c88d95

    SHA512

    99f4e867d75168c0d3080783fd1261685a23397a58791e61dde2d9df4bb475de1a467c80ca6961e72a7fe636d125b9aeafdf73ce48f462ae7cc74d128b5253ac

  • C:\Windows\Temp\asw.366b87c71232dbfd\Instup.dll

    MD5

    572a994c27f9ba5ecab6e4950a912ffc

    SHA1

    4fc57d135065f85e78e95dde1a463488c2937388

    SHA256

    ad380e444656ed09bc76b9febe1ed55c0a61c9d62b2ef87a3406cb63f09716f0

    SHA512

    aadcf14494a163ad0c5a78dd76f0596a9578ddc593b16d09f7b17beafe70d50e9f45197f052347d9ccbaa4cec2c386c36e48aab94870159d740f7bfd89e20b9d

  • C:\Windows\Temp\asw.366b87c71232dbfd\Instup.exe

    MD5

    f21f2afaf1f6ad2fb6303adf10c2b4af

    SHA1

    a1468f6eec69d1d9e20637013fe4dcb35eb8be55

    SHA256

    6949e5bd975c7bbccdf319e70cafffe5a8ae7fb6c5be21a50ca85adcb3bc7cc1

    SHA512

    d45e34db9e9e2f05c2b1565d62c94d15cb540d49be9cfe84bab36d19f89b6be54fdac40f7607a029fe9528e56f7dbb885f60a3e03899305161da67a87887b105

  • C:\Windows\Temp\asw.366b87c71232dbfd\config.def

    MD5

    1996c8cc8f2c87de901578faa1afe67f

    SHA1

    2d67b13e4ba12ffbd4079ea23a496e9b7fd31d2e

    SHA256

    ce3f2dd8670899f4754fd48e8fe6ce7da83f2d37ce98706a2f479ee4f2dd245b

    SHA512

    6f486ddb09bfb6f2936b715b52480bb3094ba6a55d9f7874c4716735ed65181002f86dc07245f1a1d1645260728a82c36b0ff03e3c7d41ca90ce6588d3f4e600

  • C:\Windows\Temp\asw.366b87c71232dbfd\part-jrog2-58d.vpx

    MD5

    6555a97914613a1fcc6bb423e6a0c493

    SHA1

    c622c2984b3ed55d8d9f9e8d14398a128ff86e7a

    SHA256

    8b2ecb16f1b8d270fc5f75c54637bc439939fbc1baf3f1d2370e0820a953fe6c

    SHA512

    48c930a8d47b5e8411d20aa9bdea05907fc0a0b3c239ecb737896dce057a473af7d917cecfc5da79fb79e9932cabc06e45d2c2422f1cd9e8ff675715efdd4d07

  • C:\Windows\Temp\asw.366b87c71232dbfd\part-prg_ais-14020961.vpx

    MD5

    0337017aa6699504796534de35a6ba44

    SHA1

    b73a4388e5bd70f59a3499cfcdf18a721409b786

    SHA256

    f9b7d051ac200f10e2fe8d77abec67de5031129c2f909ac52ebaffc0ad4cb7f0

    SHA512

    3030a5a8dfcc479da88243027f1b46274ef7eaa656f8e5b91937763108a0eea12f6ad4e843bd7ba0ed3697ac10f267f74e98914428e8914e40c0f7c7078330e6

  • C:\Windows\Temp\asw.366b87c71232dbfd\part-setup_ais-14020961.vpx

    MD5

    444400b7c8fdaed4c6fb29bff2190874

    SHA1

    8a5033e6d7cea2c8e5b0fd1c22de884e93d952d3

    SHA256

    34ca34072aa722e53ba1b6cabc2d3be51cbeba713a26a818a2728ef4404b556b

    SHA512

    5403386a1ea2059a189af1f255658d1f26bd9021a4678c9d949fcb480d4df3ff435465b604cd7c60f03a0919af2cb19a286500b75c3d4651cae534462bc0d734

  • C:\Windows\Temp\asw.366b87c71232dbfd\part-vps_windows-20033106.vpx

    MD5

    16d2d74186747322d7eb60a65366cbdc

    SHA1

    3d81744ada6abbf3b29da4fd4d3385f06241d37d

    SHA256

    ce1946c594bee4977322c34e46fc1867d255df5387dccd6bdf91073d77afdd5e

    SHA512

    01e0ab43de7b2ed5117acb3dcf70b5f1b8d45affe224157d2ef8430af6fac1fc5a4a0c5dfe0dee2eaa13d16f956c374400089eaca5b8691f4bbe615e84e5a553

  • C:\Windows\Temp\asw.366b87c71232dbfd\prod-pgm.vpx

    MD5

    74709316f39666c28bba67a415a5fc1c

    SHA1

    616ddc9cad51b7265a9dd27cfdd6387de7e74b73

    SHA256

    86ddc8b3e24ce5d19a55af0c8d9c53363633223a6a3220eceea0e5c2911857ec

    SHA512

    f53bc74516d05be815f40003b84b2f10936a261c5ce6a3e52cdb3175b80b1b4e71773ddb9ac5b5766fecb4f442e3e67815ce9721d52f6b0508f2e10dbb54850b

  • C:\Windows\Temp\asw.366b87c71232dbfd\prod-vps.vpx

    MD5

    485285b8c946d64511651a446c0de8cb

    SHA1

    387f8eb55249ad5142a8213809cbe8bf72fd7b9f

    SHA256

    85029cf7feb2712f6f63ae6d593dbf681b3c178a018f88eff36e61661fdce40d

    SHA512

    5d81e28409dfca2f203f0757c3f8728ea9ebed2e2fc0a84f8e89da2d2feecbf799d78fbea107e9f8b0f8e98ac7b9650d77b82a71c30c66d561f632f199aeb0a7

  • C:\Windows\Temp\asw.366b87c71232dbfd\servers.def

    MD5

    c66eff1e07edd34ae3465b8fb23020f1

    SHA1

    9f4dd74a93e30b30e0ad5ebf61bb94485353bfbf

    SHA256

    8eb05c4d9b307cf69ed5f13dac4b18c912ea11b2230e62d9891ef1c138380a42

    SHA512

    94cae3e0050ae27eb9d10d58b4fa77f75376a6ed3f9250dc782be6d87eebc76986d3311f94f8cb59f79754bdd6372cb627d8d17f05ac5e04170fbc102bc6ce72

  • C:\Windows\Temp\asw.366b87c71232dbfd\uat.vpx

    MD5

    25b2b051bd3aef9813018cf124a94cd6

    SHA1

    70b78e1115a9da4a1dda795eb4c998b916a4534f

    SHA256

    c27727f2813469cb0e9bab848a822147f9d68128c62b40db705e21572e835d86

    SHA512

    09cab25cab64da646aac0b8721f1ef449c7e9c7256afbf54854c5de89095749b14a8581b95ce802d3b0174adde5b27ca1f5c943b7d517b7eb7c487588639f938

  • \Windows\Temp\asw.366b87c71232dbfd\HTMLayout.dll

    MD5

    6eea70d78095cab4151b4b9f398713f5

    SHA1

    0014bf3c6cd2b9ef25830c55ef43da968624cc9f

    SHA256

    f352459d5eef739bd708b710a7c525bda51941a70711629157aaaaeb92c88d95

    SHA512

    99f4e867d75168c0d3080783fd1261685a23397a58791e61dde2d9df4bb475de1a467c80ca6961e72a7fe636d125b9aeafdf73ce48f462ae7cc74d128b5253ac

  • \Windows\Temp\asw.366b87c71232dbfd\HTMLayout.dll

    MD5

    6eea70d78095cab4151b4b9f398713f5

    SHA1

    0014bf3c6cd2b9ef25830c55ef43da968624cc9f

    SHA256

    f352459d5eef739bd708b710a7c525bda51941a70711629157aaaaeb92c88d95

    SHA512

    99f4e867d75168c0d3080783fd1261685a23397a58791e61dde2d9df4bb475de1a467c80ca6961e72a7fe636d125b9aeafdf73ce48f462ae7cc74d128b5253ac

  • \Windows\Temp\asw.366b87c71232dbfd\Instup.dll

    MD5

    572a994c27f9ba5ecab6e4950a912ffc

    SHA1

    4fc57d135065f85e78e95dde1a463488c2937388

    SHA256

    ad380e444656ed09bc76b9febe1ed55c0a61c9d62b2ef87a3406cb63f09716f0

    SHA512

    aadcf14494a163ad0c5a78dd76f0596a9578ddc593b16d09f7b17beafe70d50e9f45197f052347d9ccbaa4cec2c386c36e48aab94870159d740f7bfd89e20b9d

  • \Windows\Temp\asw.366b87c71232dbfd\uat_2232.dll

    MD5

    1f392d9032e4d94da24aba89c8809c5b

    SHA1

    f4fc8ae7faec89087d482cad5e7e65123d6ce093

    SHA256

    5811ec128e1d1758023e4fedff63a7d36128c8e5c6bbf0b9d830b1bfa2eaf6d3

    SHA512

    8383a236d30400f6050d4669ecf4da94a4791f925daa98f3602cffa66b4764c8e5404249b8f41c2f6bcfacc1e3b026a8b06ce3b214dc9d4ab17a039b4be77ddf

  • memory/400-115-0x0000000000000000-mapping.dmp

  • memory/1116-114-0x0000000002D70000-0x0000000002D71000-memory.dmp

    Filesize

    4KB

  • memory/2232-123-0x0000000000000000-mapping.dmp

  • memory/2836-122-0x0000000000560000-0x00000000006AA000-memory.dmp

    Filesize

    1.3MB

  • memory/2836-118-0x0000000000000000-mapping.dmp

  • memory/3880-139-0x00007FFC3AEC0000-0x00007FFC3AED0000-memory.dmp

    Filesize

    64KB

  • memory/3880-140-0x00007FFC3AEC0000-0x00007FFC3AED0000-memory.dmp

    Filesize

    64KB

  • memory/3880-141-0x00007FFC3AEC0000-0x00007FFC3AED0000-memory.dmp

    Filesize

    64KB

  • memory/3880-142-0x00007FFC3AEC0000-0x00007FFC3AED0000-memory.dmp

    Filesize

    64KB

  • memory/3880-138-0x00007FFC3AEC0000-0x00007FFC3AED0000-memory.dmp

    Filesize

    64KB

  • memory/3880-121-0x00007FF7A4D90000-0x00007FF7A8346000-memory.dmp

    Filesize

    53.7MB

  • memory/3880-148-0x00007FFC5C2A0000-0x00007FFC5D38E000-memory.dmp

    Filesize

    16.9MB

  • memory/3880-149-0x00007FFC5A3A0000-0x00007FFC5C295000-memory.dmp

    Filesize

    31.0MB