Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    11-05-2021 13:32

General

  • Target

    eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe

  • Size

    1.1MB

  • MD5

    e709b49637fe6417c4a0d87bae495ba1

  • SHA1

    8b72aa4fa153b9f06d91eb83367223692b7e3720

  • SHA256

    eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1

  • SHA512

    f53381207787b2c67c0708ca6605b6aded2f06fb946ab9f38dfa6c75d8289edfd84743af214256a83a16f656671d1d15c37778d3b0a2bc1a567dee75c936fbb1

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Executes dropped EXE 7 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 7 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe
    "C:\Users\Admin\AppData\Local\Temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3920
    • \??\c:\users\admin\appdata\local\temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe 
      c:\users\admin\appdata\local\temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe 
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:8
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1580
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2368
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2796
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2032
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4064
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3028

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    960fce272c2fbebbb28bf756817cae91

    SHA1

    b4f99481b3f6a7c5ebe47177693644c2e38edd22

    SHA256

    f0c826acfa4e384cb5542aa294ecfc72df1e94c0096f95465f5cac9351275d93

    SHA512

    b481eed9fe7db08d8d53ed6824bece7f656f0e47faa1df4a802ec69688150cfe0d7bea49df3488e826e87e7c3be573109b356a037d30ecb69aa9ebafd8c7c378

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    960fce272c2fbebbb28bf756817cae91

    SHA1

    b4f99481b3f6a7c5ebe47177693644c2e38edd22

    SHA256

    f0c826acfa4e384cb5542aa294ecfc72df1e94c0096f95465f5cac9351275d93

    SHA512

    b481eed9fe7db08d8d53ed6824bece7f656f0e47faa1df4a802ec69688150cfe0d7bea49df3488e826e87e7c3be573109b356a037d30ecb69aa9ebafd8c7c378

  • C:\Users\Admin\AppData\Local\Temp\VXrle27H.xlsm
    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe 
    MD5

    1e5191f0baa3f589ce1c2fff0dcca9e2

    SHA1

    716cdf1c46ee24d6c7962e118073164cba5a755f

    SHA256

    59215c2c7cf54df886eccba15ce55790101f7d3000472261d20e83f404dea7e8

    SHA512

    404d1328277cd9d2d9e4c430cd3b8fc3faa49846e127e32de8fef39ebae30074393d4cbf4992c7b6438262fa168ecfbe0b24c26ae698cf4c8589a12b1e20e9be

  • C:\Windows\Resources\Themes\explorer.exe
    MD5

    abe693a9b52caf1b9018fc90a7893854

    SHA1

    ca6bf5e7480d8755a86d480433bc458d1833de3d

    SHA256

    055f41df59c7dcd9c3ccc518e436544d0db618c32ed34350b3b82f9e8257075a

    SHA512

    16e1c4edcc0e3f495297b8eed02856d6b33e09b5370d2d5a061c81ddfb7fc244c5ed9920d1dc0113a212a137624726419375ba87e96cb1b6504bf46279618d4d

  • C:\Windows\Resources\Themes\icsys.icn.exe
    MD5

    e30a7b0835775c186a2b91c658c1a2f5

    SHA1

    05676f4e95c5048fd16df9305e678ccfcb6d853e

    SHA256

    2d0865fdb772e8efb18b0f15e3a2600a82be455ff4a1b586ca49df43c8c24232

    SHA512

    d658df17c9d22d2e6546a48a3e93e5269019ab4d3744500725b8b3a3f634532d2bbca62500ccd44659569ee5c90d152087bba0a876c2149b511ee17081426bfb

  • C:\Windows\Resources\Themes\icsys.icn.exe
    MD5

    e30a7b0835775c186a2b91c658c1a2f5

    SHA1

    05676f4e95c5048fd16df9305e678ccfcb6d853e

    SHA256

    2d0865fdb772e8efb18b0f15e3a2600a82be455ff4a1b586ca49df43c8c24232

    SHA512

    d658df17c9d22d2e6546a48a3e93e5269019ab4d3744500725b8b3a3f634532d2bbca62500ccd44659569ee5c90d152087bba0a876c2149b511ee17081426bfb

  • C:\Windows\Resources\spoolsv.exe
    MD5

    ecfbed59484c10ea06419ea4a110cc07

    SHA1

    0bfae778fd76e1fa6eecc1e09390eb8f538012c6

    SHA256

    86c0477e892a6a77527cdbdd0afd8390921511fd92db8071aac1b99331ee3724

    SHA512

    f7257963b0a26cbb29ab18ac2155385b50cf3f996174fe2b09171317ebce25050d3fcf9c13a1c85553103e77c3929ba6d8bef88ee37e5439ec61029505dae697

  • C:\Windows\Resources\spoolsv.exe
    MD5

    ecfbed59484c10ea06419ea4a110cc07

    SHA1

    0bfae778fd76e1fa6eecc1e09390eb8f538012c6

    SHA256

    86c0477e892a6a77527cdbdd0afd8390921511fd92db8071aac1b99331ee3724

    SHA512

    f7257963b0a26cbb29ab18ac2155385b50cf3f996174fe2b09171317ebce25050d3fcf9c13a1c85553103e77c3929ba6d8bef88ee37e5439ec61029505dae697

  • C:\Windows\Resources\svchost.exe
    MD5

    62521fd2a3d6f80c000f06db7b946784

    SHA1

    d22deb22c8804f5a98d2507f6c7301d52d3e9875

    SHA256

    7e1235ac7fc93a9ea04795563acb085b1e0b328e208ceab532fe40dfe1c9b78e

    SHA512

    16204e9c55092d89b7d9fe4ff1dd16fd4781b800c8f685a6d94b696c5986e135d1a82df6b582c75d5a5bea143ed7cc8466eab168344bcf15b160bd3bd2e1097d

  • \??\c:\users\admin\appdata\local\temp\eb7966388d917e0699365202de9a50848c3dbe4e4be362eacc385053309911c1.exe 
    MD5

    1e5191f0baa3f589ce1c2fff0dcca9e2

    SHA1

    716cdf1c46ee24d6c7962e118073164cba5a755f

    SHA256

    59215c2c7cf54df886eccba15ce55790101f7d3000472261d20e83f404dea7e8

    SHA512

    404d1328277cd9d2d9e4c430cd3b8fc3faa49846e127e32de8fef39ebae30074393d4cbf4992c7b6438262fa168ecfbe0b24c26ae698cf4c8589a12b1e20e9be

  • \??\c:\windows\resources\spoolsv.exe
    MD5

    ecfbed59484c10ea06419ea4a110cc07

    SHA1

    0bfae778fd76e1fa6eecc1e09390eb8f538012c6

    SHA256

    86c0477e892a6a77527cdbdd0afd8390921511fd92db8071aac1b99331ee3724

    SHA512

    f7257963b0a26cbb29ab18ac2155385b50cf3f996174fe2b09171317ebce25050d3fcf9c13a1c85553103e77c3929ba6d8bef88ee37e5439ec61029505dae697

  • \??\c:\windows\resources\svchost.exe
    MD5

    62521fd2a3d6f80c000f06db7b946784

    SHA1

    d22deb22c8804f5a98d2507f6c7301d52d3e9875

    SHA256

    7e1235ac7fc93a9ea04795563acb085b1e0b328e208ceab532fe40dfe1c9b78e

    SHA512

    16204e9c55092d89b7d9fe4ff1dd16fd4781b800c8f685a6d94b696c5986e135d1a82df6b582c75d5a5bea143ed7cc8466eab168344bcf15b160bd3bd2e1097d

  • \??\c:\windows\resources\themes\explorer.exe
    MD5

    abe693a9b52caf1b9018fc90a7893854

    SHA1

    ca6bf5e7480d8755a86d480433bc458d1833de3d

    SHA256

    055f41df59c7dcd9c3ccc518e436544d0db618c32ed34350b3b82f9e8257075a

    SHA512

    16e1c4edcc0e3f495297b8eed02856d6b33e09b5370d2d5a061c81ddfb7fc244c5ed9920d1dc0113a212a137624726419375ba87e96cb1b6504bf46279618d4d

  • memory/8-153-0x0000000000610000-0x000000000075A000-memory.dmp
    Filesize

    1.3MB

  • memory/8-148-0x0000000000000000-mapping.dmp
  • memory/1240-117-0x0000000000000000-mapping.dmp
  • memory/1240-121-0x0000000000660000-0x00000000007AA000-memory.dmp
    Filesize

    1.3MB

  • memory/1580-120-0x0000000000000000-mapping.dmp
  • memory/2032-139-0x0000000000000000-mapping.dmp
  • memory/2368-127-0x0000000000000000-mapping.dmp
  • memory/2796-133-0x0000000000000000-mapping.dmp
  • memory/3028-155-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/3028-154-0x00007FF7C0B30000-0x00007FF7C40E6000-memory.dmp
    Filesize

    53.7MB

  • memory/3028-156-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/3028-157-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/3028-158-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/3028-162-0x00007FF94EEB0000-0x00007FF94EEC0000-memory.dmp
    Filesize

    64KB

  • memory/3028-161-0x00007FF96F4A0000-0x00007FF97058E000-memory.dmp
    Filesize

    16.9MB

  • memory/3028-163-0x0000020A7A9C0000-0x0000020A7C8B5000-memory.dmp
    Filesize

    31.0MB

  • memory/4064-145-0x0000000000000000-mapping.dmp