Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    11-05-2021 17:46

General

  • Target

    d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe

  • Size

    821KB

  • MD5

    3737064e0e28b42ec8cc9957fbcc28d1

  • SHA1

    4633b678296a0b4d3529751e8667b8764a3eed4d

  • SHA256

    d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d

  • SHA512

    1ba556813b08356d151e1b5e72f688f47139880fb36033ae7e10f7661d1eadb3952edb05b54111b7da2d7fc5aedcb729f9a318e713d273e2674a06134a8402fc

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe
    "C:\Users\Admin\AppData\Local\Temp\d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe
        "C:\Users\Admin\AppData\Local\Temp\d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Users\Admin\AppData\Local\Temp\._cache_d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe"
          4⤵
          • Executes dropped EXE
          PID:1912
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:980
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    PID:1544

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    af4f848c5d2fd90c5e0d81d7672497b9

    SHA1

    153669eb359603d17b1872422057a2cb4c0934d6

    SHA256

    6c7dee509814ac1779f7bd29cc3f504b7b4e50cdc136324add91e748ce971530

    SHA512

    cb672b273a6594ec75730ea6e1cf3105781cb8fffcde8b2dbd77d79e04ae0a0a6ba971cdbe8dc47a5b552fe0dbb58557346f751808eae9f5d7edd2acbf3c28b4

  • C:\Users\Admin\AppData\Local\Temp\._cache_d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe
    MD5

    510718bbf70b835b3bcf15212f73825f

    SHA1

    ad70a71088a8703ec81eb4ad307a0105a29199ac

    SHA256

    1442420937e6276905197078ae1b251a2e93eb42a40bbd6e6c8d9a981945391f

    SHA512

    89057691a7e3d935d10b1ecd1af2d68225c821fc62850ef8b24242f16a8f4d504c0d753a3abecccddca98871ddd6a5a0b8e8415f7c057b33aeaab7e7f02694a7

  • C:\Users\Admin\AppData\Local\Temp\d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe
    MD5

    412b9f01288f592165e11eb05abb3e2f

    SHA1

    955bb7c9df334b7931ed29c339235a6e114bc791

    SHA256

    8bff51700b1303595b5c8afa10d3bb928d5a31b7e236576943fb0c500245069b

    SHA512

    9fe790c91d5eded3445cfcff1379c31eba8f30634f2441b4bd27a186439982fc8c0c51d6a109842d071f350b674a3689c0e1ed1e574feef04767993e603c6932

  • C:\Users\Admin\AppData\Local\Temp\d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe
    MD5

    412b9f01288f592165e11eb05abb3e2f

    SHA1

    955bb7c9df334b7931ed29c339235a6e114bc791

    SHA256

    8bff51700b1303595b5c8afa10d3bb928d5a31b7e236576943fb0c500245069b

    SHA512

    9fe790c91d5eded3445cfcff1379c31eba8f30634f2441b4bd27a186439982fc8c0c51d6a109842d071f350b674a3689c0e1ed1e574feef04767993e603c6932

  • C:\Windows\svchost.exe
    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe
    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe
    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • \ProgramData\Synaptics\Synaptics.exe
    MD5

    af4f848c5d2fd90c5e0d81d7672497b9

    SHA1

    153669eb359603d17b1872422057a2cb4c0934d6

    SHA256

    6c7dee509814ac1779f7bd29cc3f504b7b4e50cdc136324add91e748ce971530

    SHA512

    cb672b273a6594ec75730ea6e1cf3105781cb8fffcde8b2dbd77d79e04ae0a0a6ba971cdbe8dc47a5b552fe0dbb58557346f751808eae9f5d7edd2acbf3c28b4

  • \ProgramData\Synaptics\Synaptics.exe
    MD5

    af4f848c5d2fd90c5e0d81d7672497b9

    SHA1

    153669eb359603d17b1872422057a2cb4c0934d6

    SHA256

    6c7dee509814ac1779f7bd29cc3f504b7b4e50cdc136324add91e748ce971530

    SHA512

    cb672b273a6594ec75730ea6e1cf3105781cb8fffcde8b2dbd77d79e04ae0a0a6ba971cdbe8dc47a5b552fe0dbb58557346f751808eae9f5d7edd2acbf3c28b4

  • \Users\Admin\AppData\Local\Temp\._cache_d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe
    MD5

    510718bbf70b835b3bcf15212f73825f

    SHA1

    ad70a71088a8703ec81eb4ad307a0105a29199ac

    SHA256

    1442420937e6276905197078ae1b251a2e93eb42a40bbd6e6c8d9a981945391f

    SHA512

    89057691a7e3d935d10b1ecd1af2d68225c821fc62850ef8b24242f16a8f4d504c0d753a3abecccddca98871ddd6a5a0b8e8415f7c057b33aeaab7e7f02694a7

  • \Users\Admin\AppData\Local\Temp\._cache_d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe
    MD5

    510718bbf70b835b3bcf15212f73825f

    SHA1

    ad70a71088a8703ec81eb4ad307a0105a29199ac

    SHA256

    1442420937e6276905197078ae1b251a2e93eb42a40bbd6e6c8d9a981945391f

    SHA512

    89057691a7e3d935d10b1ecd1af2d68225c821fc62850ef8b24242f16a8f4d504c0d753a3abecccddca98871ddd6a5a0b8e8415f7c057b33aeaab7e7f02694a7

  • \Users\Admin\AppData\Local\Temp\d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe
    MD5

    412b9f01288f592165e11eb05abb3e2f

    SHA1

    955bb7c9df334b7931ed29c339235a6e114bc791

    SHA256

    8bff51700b1303595b5c8afa10d3bb928d5a31b7e236576943fb0c500245069b

    SHA512

    9fe790c91d5eded3445cfcff1379c31eba8f30634f2441b4bd27a186439982fc8c0c51d6a109842d071f350b674a3689c0e1ed1e574feef04767993e603c6932

  • \Users\Admin\AppData\Local\Temp\d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe
    MD5

    412b9f01288f592165e11eb05abb3e2f

    SHA1

    955bb7c9df334b7931ed29c339235a6e114bc791

    SHA256

    8bff51700b1303595b5c8afa10d3bb928d5a31b7e236576943fb0c500245069b

    SHA512

    9fe790c91d5eded3445cfcff1379c31eba8f30634f2441b4bd27a186439982fc8c0c51d6a109842d071f350b674a3689c0e1ed1e574feef04767993e603c6932

  • \Users\Admin\AppData\Local\Temp\d450db87354c56a35abc7e01da8825fd99f7a1c35eba3377fb2f705133ccf14d.exe
    MD5

    412b9f01288f592165e11eb05abb3e2f

    SHA1

    955bb7c9df334b7931ed29c339235a6e114bc791

    SHA256

    8bff51700b1303595b5c8afa10d3bb928d5a31b7e236576943fb0c500245069b

    SHA512

    9fe790c91d5eded3445cfcff1379c31eba8f30634f2441b4bd27a186439982fc8c0c51d6a109842d071f350b674a3689c0e1ed1e574feef04767993e603c6932

  • memory/316-69-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/316-67-0x0000000076281000-0x0000000076283000-memory.dmp
    Filesize

    8KB

  • memory/316-65-0x0000000000000000-mapping.dmp
  • memory/980-78-0x0000000000000000-mapping.dmp
  • memory/980-81-0x0000000000390000-0x0000000000391000-memory.dmp
    Filesize

    4KB

  • memory/1232-60-0x0000000000000000-mapping.dmp
  • memory/1912-74-0x0000000000000000-mapping.dmp