Analysis

  • max time kernel
    123s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    09-05-2021 00:10

General

  • Target

    a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9.exe

  • Size

    12.4MB

  • MD5

    1bfe1deb59ff2aba2514255d49315d4d

  • SHA1

    db74dbcf9235e7f55070bfd13db416f23ee4bb95

  • SHA256

    a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9

  • SHA512

    b86ae38eb2ea52696ab3aa0e39af3bd2fc7c6f54e9160269dd3c078064207001c9aac30a1b2bdd3ac568e52e7ff285ff2b8f988cb23c3852d30592fd30b8c2af

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9.exe
    "C:\Users\Admin\AppData\Local\Temp\a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Users\Admin\AppData\Local\Temp\._cache_a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:200
      • C:\Users\Admin\AppData\Local\Temp\is-82CEO.tmp\._cache_a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-82CEO.tmp\._cache_a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9.tmp" /SL5="$301CC,11609368,137216,C:\Users\Admin\AppData\Local\Temp\._cache_a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9.exe"
        3⤵
        • Executes dropped EXE
        PID:2352
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:768
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3244

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    bb2c84bb8a9d160bf26b3e16be8edd42

    SHA1

    6548dada775dfb6e08b78b0d6b4fdcf51bf9aefd

    SHA256

    56986c59214f442c21b85fcef7284faa58c05d867d8ee4b4fc3c9197f17e4a20

    SHA512

    618655a3c0d0deed67ff0e1ab6e3396c51ef4c45e96704289707ba122cdd009560972ca6c104175afb88db848cf47369d81b28551684c032f1ef8ad208293641

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    bb2c84bb8a9d160bf26b3e16be8edd42

    SHA1

    6548dada775dfb6e08b78b0d6b4fdcf51bf9aefd

    SHA256

    56986c59214f442c21b85fcef7284faa58c05d867d8ee4b4fc3c9197f17e4a20

    SHA512

    618655a3c0d0deed67ff0e1ab6e3396c51ef4c45e96704289707ba122cdd009560972ca6c104175afb88db848cf47369d81b28551684c032f1ef8ad208293641

  • C:\Users\Admin\AppData\Local\Temp\._cache_a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9.exe
    MD5

    a0653c3ac75af7d59c69d844e06d8baa

    SHA1

    77bf586a7849532a9f91f6cff1aaf840cf9ca5c6

    SHA256

    a67b541941f0840ed3421dc0ab2ba4a0169fe73199e600f7bede1374410cab2e

    SHA512

    bf6ba41212d7457bdc73e8d9e63d0737f0a16beee62618cfc863f660bc0df7beb2a4475f94c3959f90c0ccbe2dee4f90b39355b90243ab4371e0fc5445ea17d2

  • C:\Users\Admin\AppData\Local\Temp\._cache_a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9.exe
    MD5

    a0653c3ac75af7d59c69d844e06d8baa

    SHA1

    77bf586a7849532a9f91f6cff1aaf840cf9ca5c6

    SHA256

    a67b541941f0840ed3421dc0ab2ba4a0169fe73199e600f7bede1374410cab2e

    SHA512

    bf6ba41212d7457bdc73e8d9e63d0737f0a16beee62618cfc863f660bc0df7beb2a4475f94c3959f90c0ccbe2dee4f90b39355b90243ab4371e0fc5445ea17d2

  • C:\Users\Admin\AppData\Local\Temp\dSH5Iptp.xlsm
    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\is-82CEO.tmp\._cache_a778e3abd815a9ae670d6c8013bcddac0bd1066ad3f9e051dfea676e31d675c9.tmp
    MD5

    6ebf13efac3b7c19a48893c0df501bfe

    SHA1

    f40d312460b3ff4d151bcb3b613e50829b77d02d

    SHA256

    dedd0266bfd3d9f80584f2d123a286a2b3ad5c549cc1baa7a40c4f413c24bc38

    SHA512

    88f6d914cc40bbc57e300a6582547e98c109ece122d606f7238411a8309cb163234b802797b8beeec8e4d51d6ac9f9ceeedc74b5707ff574b64ad46ec6104b7d

  • memory/200-115-0x0000000000000000-mapping.dmp
  • memory/200-117-0x0000000000400000-0x000000000042C000-memory.dmp
    Filesize

    176KB

  • memory/640-114-0x0000000001200000-0x0000000001201000-memory.dmp
    Filesize

    4KB

  • memory/768-127-0x00000000005F0000-0x000000000073A000-memory.dmp
    Filesize

    1.3MB

  • memory/768-121-0x0000000000000000-mapping.dmp
  • memory/2352-119-0x0000000000000000-mapping.dmp
  • memory/2352-123-0x00000000007E0000-0x00000000007E1000-memory.dmp
    Filesize

    4KB

  • memory/3244-126-0x00007FF6427C0000-0x00007FF645D76000-memory.dmp
    Filesize

    53.7MB

  • memory/3244-128-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmp
    Filesize

    64KB

  • memory/3244-129-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmp
    Filesize

    64KB

  • memory/3244-130-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmp
    Filesize

    64KB

  • memory/3244-131-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmp
    Filesize

    64KB

  • memory/3244-132-0x00007FFAC4B10000-0x00007FFAC4B20000-memory.dmp
    Filesize

    64KB

  • memory/3244-135-0x00007FFAE62E0000-0x00007FFAE73CE000-memory.dmp
    Filesize

    16.9MB

  • memory/3244-136-0x00007FFAE43E0000-0x00007FFAE62D5000-memory.dmp
    Filesize

    31.0MB