Analysis

  • max time kernel
    151s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    11-05-2021 13:32

General

  • Target

    eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe

  • Size

    1.1MB

  • MD5

    e709b49637fe6417c4a0d87bae495ba1

  • SHA1

    8b72aa4fa153b9f06d91eb83367223692b7e3720

  • SHA256

    eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1

  • SHA512

    f53381207787b2c67c0708ca6605b6aded2f06fb946ab9f38dfa6c75d8289edfd84743af214256a83a16f656671d1d15c37778d3b0a2bc1a567dee75c936fbb1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe
    "C:\Users\Admin\AppData\Local\Temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1096
    • \??\c:\users\admin\appdata\local\temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe 
      c:\users\admin\appdata\local\temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe 
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:548
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1980
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1740
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1724
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1344
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1692
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:58 /f
              6⤵
              • Creates scheduled task(s)
              PID:596
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:59 /f
              6⤵
              • Creates scheduled task(s)
              PID:336
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 20:00 /f
              6⤵
              • Creates scheduled task(s)
              PID:892
        • C:\Windows\Explorer.exe
          C:\Windows\Explorer.exe
          4⤵
            PID:788

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Hidden Files and Directories

    1
    T1158

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Hidden Files and Directories

    1
    T1158

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      960fce272c2fbebbb28bf756817cae91

      SHA1

      b4f99481b3f6a7c5ebe47177693644c2e38edd22

      SHA256

      f0c826acfa4e384cb5542aa294ecfc72df1e94c0096f95465f5cac9351275d93

      SHA512

      b481eed9fe7db08d8d53ed6824bece7f656f0e47faa1df4a802ec69688150cfe0d7bea49df3488e826e87e7c3be573109b356a037d30ecb69aa9ebafd8c7c378

    • C:\Users\Admin\AppData\Local\Temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe 
      MD5

      1e5191f0baa3f589ce1c2fff0dcca9e2

      SHA1

      716cdf1c46ee24d6c7962e118073164cba5a755f

      SHA256

      59215c2c7cf54df886eccba15ce55790101f7d3000472261d20e83f404dea7e8

      SHA512

      404d1328277cd9d2d9e4c430cd3b8fc3faa49846e127e32de8fef39ebae30074393d4cbf4992c7b6438262fa168ecfbe0b24c26ae698cf4c8589a12b1e20e9be

    • C:\Windows\Resources\Themes\explorer.exe
      MD5

      05d0fb8dfd74fd916ac7065ed69c9bb9

      SHA1

      c0c4ae2d6732fc5116122a012c76369f4fc5b30d

      SHA256

      1ee00aba12c8b9b30b050be8c97abd4197a9748c763d9096f796e40615d1c7a2

      SHA512

      76dc0db82090838b698e19568d2ccf5a7508c2ad1b5fa6f07c157edcad7d51f38cf34a32701d6c0266a18473791f03dd3cc3ef904b93f66a3be58d982f345b5b

    • C:\Windows\Resources\Themes\icsys.icn.exe
      MD5

      e30a7b0835775c186a2b91c658c1a2f5

      SHA1

      05676f4e95c5048fd16df9305e678ccfcb6d853e

      SHA256

      2d0865fdb772e8efb18b0f15e3a2600a82be455ff4a1b586ca49df43c8c24232

      SHA512

      d658df17c9d22d2e6546a48a3e93e5269019ab4d3744500725b8b3a3f634532d2bbca62500ccd44659569ee5c90d152087bba0a876c2149b511ee17081426bfb

    • C:\Windows\Resources\spoolsv.exe
      MD5

      495f8ac166c31a1748ab08be2978a0a0

      SHA1

      a0411c31f97f70ac9c2464f4f2221c7a99234277

      SHA256

      a1aa63055926a85ae997f0ae8dd898d73051c857a5eb82da6b7b3fc31e4cdb5f

      SHA512

      39b4efdcffe81d213575120930f18f9face223d46463f9c5fd5fab56addcdadadd7974b92c23ae9b033b99d2599086f47ca6736beecce601512b867917bb1f98

    • C:\Windows\Resources\spoolsv.exe
      MD5

      495f8ac166c31a1748ab08be2978a0a0

      SHA1

      a0411c31f97f70ac9c2464f4f2221c7a99234277

      SHA256

      a1aa63055926a85ae997f0ae8dd898d73051c857a5eb82da6b7b3fc31e4cdb5f

      SHA512

      39b4efdcffe81d213575120930f18f9face223d46463f9c5fd5fab56addcdadadd7974b92c23ae9b033b99d2599086f47ca6736beecce601512b867917bb1f98

    • C:\Windows\Resources\svchost.exe
      MD5

      a20fc9f15ac0733fdb08528738b9b604

      SHA1

      421964fc39e0c95c71abef2d6708e550af670a05

      SHA256

      bac3ac6e79445906c98eaae77e0cd5ea3fa46130247f2f5d13cf317f673d9a65

      SHA512

      ecb504b61902e656e29790958b704c02150e0416afdadb23820db027099bc29fc0947d06e5400fb0e3741f363b1fd2574f4cd7cd2ad2b83403f3a42a1e4c000f

    • \??\c:\users\admin\appdata\local\temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe 
      MD5

      1e5191f0baa3f589ce1c2fff0dcca9e2

      SHA1

      716cdf1c46ee24d6c7962e118073164cba5a755f

      SHA256

      59215c2c7cf54df886eccba15ce55790101f7d3000472261d20e83f404dea7e8

      SHA512

      404d1328277cd9d2d9e4c430cd3b8fc3faa49846e127e32de8fef39ebae30074393d4cbf4992c7b6438262fa168ecfbe0b24c26ae698cf4c8589a12b1e20e9be

    • \??\c:\windows\resources\spoolsv.exe
      MD5

      495f8ac166c31a1748ab08be2978a0a0

      SHA1

      a0411c31f97f70ac9c2464f4f2221c7a99234277

      SHA256

      a1aa63055926a85ae997f0ae8dd898d73051c857a5eb82da6b7b3fc31e4cdb5f

      SHA512

      39b4efdcffe81d213575120930f18f9face223d46463f9c5fd5fab56addcdadadd7974b92c23ae9b033b99d2599086f47ca6736beecce601512b867917bb1f98

    • \??\c:\windows\resources\svchost.exe
      MD5

      a20fc9f15ac0733fdb08528738b9b604

      SHA1

      421964fc39e0c95c71abef2d6708e550af670a05

      SHA256

      bac3ac6e79445906c98eaae77e0cd5ea3fa46130247f2f5d13cf317f673d9a65

      SHA512

      ecb504b61902e656e29790958b704c02150e0416afdadb23820db027099bc29fc0947d06e5400fb0e3741f363b1fd2574f4cd7cd2ad2b83403f3a42a1e4c000f

    • \??\c:\windows\resources\themes\explorer.exe
      MD5

      05d0fb8dfd74fd916ac7065ed69c9bb9

      SHA1

      c0c4ae2d6732fc5116122a012c76369f4fc5b30d

      SHA256

      1ee00aba12c8b9b30b050be8c97abd4197a9748c763d9096f796e40615d1c7a2

      SHA512

      76dc0db82090838b698e19568d2ccf5a7508c2ad1b5fa6f07c157edcad7d51f38cf34a32701d6c0266a18473791f03dd3cc3ef904b93f66a3be58d982f345b5b

    • \??\c:\windows\resources\themes\icsys.icn.exe
      MD5

      e30a7b0835775c186a2b91c658c1a2f5

      SHA1

      05676f4e95c5048fd16df9305e678ccfcb6d853e

      SHA256

      2d0865fdb772e8efb18b0f15e3a2600a82be455ff4a1b586ca49df43c8c24232

      SHA512

      d658df17c9d22d2e6546a48a3e93e5269019ab4d3744500725b8b3a3f634532d2bbca62500ccd44659569ee5c90d152087bba0a876c2149b511ee17081426bfb

    • \ProgramData\Synaptics\Synaptics.exe
      MD5

      960fce272c2fbebbb28bf756817cae91

      SHA1

      b4f99481b3f6a7c5ebe47177693644c2e38edd22

      SHA256

      f0c826acfa4e384cb5542aa294ecfc72df1e94c0096f95465f5cac9351275d93

      SHA512

      b481eed9fe7db08d8d53ed6824bece7f656f0e47faa1df4a802ec69688150cfe0d7bea49df3488e826e87e7c3be573109b356a037d30ecb69aa9ebafd8c7c378

    • \ProgramData\Synaptics\Synaptics.exe
      MD5

      960fce272c2fbebbb28bf756817cae91

      SHA1

      b4f99481b3f6a7c5ebe47177693644c2e38edd22

      SHA256

      f0c826acfa4e384cb5542aa294ecfc72df1e94c0096f95465f5cac9351275d93

      SHA512

      b481eed9fe7db08d8d53ed6824bece7f656f0e47faa1df4a802ec69688150cfe0d7bea49df3488e826e87e7c3be573109b356a037d30ecb69aa9ebafd8c7c378

    • \Users\Admin\AppData\Local\Temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe 
      MD5

      1e5191f0baa3f589ce1c2fff0dcca9e2

      SHA1

      716cdf1c46ee24d6c7962e118073164cba5a755f

      SHA256

      59215c2c7cf54df886eccba15ce55790101f7d3000472261d20e83f404dea7e8

      SHA512

      404d1328277cd9d2d9e4c430cd3b8fc3faa49846e127e32de8fef39ebae30074393d4cbf4992c7b6438262fa168ecfbe0b24c26ae698cf4c8589a12b1e20e9be

    • \Users\Admin\AppData\Local\Temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe 
      MD5

      1e5191f0baa3f589ce1c2fff0dcca9e2

      SHA1

      716cdf1c46ee24d6c7962e118073164cba5a755f

      SHA256

      59215c2c7cf54df886eccba15ce55790101f7d3000472261d20e83f404dea7e8

      SHA512

      404d1328277cd9d2d9e4c430cd3b8fc3faa49846e127e32de8fef39ebae30074393d4cbf4992c7b6438262fa168ecfbe0b24c26ae698cf4c8589a12b1e20e9be

    • \Users\Admin\AppData\Local\Temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe 
      MD5

      1e5191f0baa3f589ce1c2fff0dcca9e2

      SHA1

      716cdf1c46ee24d6c7962e118073164cba5a755f

      SHA256

      59215c2c7cf54df886eccba15ce55790101f7d3000472261d20e83f404dea7e8

      SHA512

      404d1328277cd9d2d9e4c430cd3b8fc3faa49846e127e32de8fef39ebae30074393d4cbf4992c7b6438262fa168ecfbe0b24c26ae698cf4c8589a12b1e20e9be

    • \Windows\Resources\Themes\explorer.exe
      MD5

      05d0fb8dfd74fd916ac7065ed69c9bb9

      SHA1

      c0c4ae2d6732fc5116122a012c76369f4fc5b30d

      SHA256

      1ee00aba12c8b9b30b050be8c97abd4197a9748c763d9096f796e40615d1c7a2

      SHA512

      76dc0db82090838b698e19568d2ccf5a7508c2ad1b5fa6f07c157edcad7d51f38cf34a32701d6c0266a18473791f03dd3cc3ef904b93f66a3be58d982f345b5b

    • \Windows\Resources\Themes\icsys.icn.exe
      MD5

      e30a7b0835775c186a2b91c658c1a2f5

      SHA1

      05676f4e95c5048fd16df9305e678ccfcb6d853e

      SHA256

      2d0865fdb772e8efb18b0f15e3a2600a82be455ff4a1b586ca49df43c8c24232

      SHA512

      d658df17c9d22d2e6546a48a3e93e5269019ab4d3744500725b8b3a3f634532d2bbca62500ccd44659569ee5c90d152087bba0a876c2149b511ee17081426bfb

    • \Windows\Resources\spoolsv.exe
      MD5

      495f8ac166c31a1748ab08be2978a0a0

      SHA1

      a0411c31f97f70ac9c2464f4f2221c7a99234277

      SHA256

      a1aa63055926a85ae997f0ae8dd898d73051c857a5eb82da6b7b3fc31e4cdb5f

      SHA512

      39b4efdcffe81d213575120930f18f9face223d46463f9c5fd5fab56addcdadadd7974b92c23ae9b033b99d2599086f47ca6736beecce601512b867917bb1f98

    • \Windows\Resources\spoolsv.exe
      MD5

      495f8ac166c31a1748ab08be2978a0a0

      SHA1

      a0411c31f97f70ac9c2464f4f2221c7a99234277

      SHA256

      a1aa63055926a85ae997f0ae8dd898d73051c857a5eb82da6b7b3fc31e4cdb5f

      SHA512

      39b4efdcffe81d213575120930f18f9face223d46463f9c5fd5fab56addcdadadd7974b92c23ae9b033b99d2599086f47ca6736beecce601512b867917bb1f98

    • \Windows\Resources\svchost.exe
      MD5

      a20fc9f15ac0733fdb08528738b9b604

      SHA1

      421964fc39e0c95c71abef2d6708e550af670a05

      SHA256

      bac3ac6e79445906c98eaae77e0cd5ea3fa46130247f2f5d13cf317f673d9a65

      SHA512

      ecb504b61902e656e29790958b704c02150e0416afdadb23820db027099bc29fc0947d06e5400fb0e3741f363b1fd2574f4cd7cd2ad2b83403f3a42a1e4c000f

    • memory/336-113-0x0000000000000000-mapping.dmp
    • memory/548-109-0x0000000000000000-mapping.dmp
    • memory/548-112-0x0000000000220000-0x0000000000221000-memory.dmp
      Filesize

      4KB

    • memory/596-105-0x0000000000000000-mapping.dmp
    • memory/788-104-0x000007FEFC221000-0x000007FEFC223000-memory.dmp
      Filesize

      8KB

    • memory/788-103-0x0000000000000000-mapping.dmp
    • memory/892-114-0x0000000000000000-mapping.dmp
    • memory/1344-90-0x0000000000000000-mapping.dmp
    • memory/1524-77-0x00000000001B0000-0x00000000001B1000-memory.dmp
      Filesize

      4KB

    • memory/1524-66-0x00000000768B1000-0x00000000768B3000-memory.dmp
      Filesize

      8KB

    • memory/1524-64-0x0000000000000000-mapping.dmp
    • memory/1692-98-0x0000000000000000-mapping.dmp
    • memory/1724-83-0x0000000000000000-mapping.dmp
    • memory/1740-75-0x0000000000000000-mapping.dmp
    • memory/1980-68-0x0000000000000000-mapping.dmp