Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    11-05-2021 14:34

General

  • Target

    cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe

  • Size

    10.2MB

  • MD5

    1e38cc018755dbfa12d0775c2d591675

  • SHA1

    1ad7aa9bf01619a6d93e1314056f68af9d66e790

  • SHA256

    cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e

  • SHA512

    bdac9c005a2665d7114a70a2414f8d97d0630342700d3315232003de79bc01e521a0c97c8c9e7dc34b9b14503b6a188e79199b5ad81128a87657f5f021362dc7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe
    "C:\Users\Admin\AppData\Local\Temp\cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1396
      • C:\Users\Admin\AppData\Local\Temp\is-DBHKN.tmp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-DBHKN.tmp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.tmp" /SL5="$5012C,9484847,477184,C:\Users\Admin\AppData\Local\Temp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: GetForegroundWindowSpam
        PID:1556
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1468
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    MD5

    6f8b6dfb49d636ae6a5c829ccca9cfac

    SHA1

    8d8efa3b5e918146ddcd50b75cf55989e3bf1d83

    SHA256

    638bafc4f19fbf5670372bf6cd5662938d3d36adeabc0ad5eed3b09fcb08b38a

    SHA512

    e7cc997c86a909b9f4c112e5c6c91053c34f92e628aaa6e18409284dc15857a1cfd2d1fe40193ccda2bf32d462a41f68c4b759aeca512e9dc61e962f55e25947

  • C:\ProgramData\Synaptics\Synaptics.exe

    MD5

    6f8b6dfb49d636ae6a5c829ccca9cfac

    SHA1

    8d8efa3b5e918146ddcd50b75cf55989e3bf1d83

    SHA256

    638bafc4f19fbf5670372bf6cd5662938d3d36adeabc0ad5eed3b09fcb08b38a

    SHA512

    e7cc997c86a909b9f4c112e5c6c91053c34f92e628aaa6e18409284dc15857a1cfd2d1fe40193ccda2bf32d462a41f68c4b759aeca512e9dc61e962f55e25947

  • C:\Users\Admin\AppData\Local\Temp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe

    MD5

    18b2f30c6a31484de65fda1fa3f69419

    SHA1

    94d2da9d29c38e4e45e26f107eaa75981d7c582b

    SHA256

    635f993a2d060d7c0ddc34db5c4301912ed17358113213f6cadbcc09eba3c9ec

    SHA512

    5bba69f39fb996170b18813d082ca8cd16463050b6149e3e4cc36f614acafbb39ffe5e117eeb9e8502a197ca318534670a8809132f2d6edf2fabdb4337669342

  • C:\Users\Admin\AppData\Local\Temp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe

    MD5

    18b2f30c6a31484de65fda1fa3f69419

    SHA1

    94d2da9d29c38e4e45e26f107eaa75981d7c582b

    SHA256

    635f993a2d060d7c0ddc34db5c4301912ed17358113213f6cadbcc09eba3c9ec

    SHA512

    5bba69f39fb996170b18813d082ca8cd16463050b6149e3e4cc36f614acafbb39ffe5e117eeb9e8502a197ca318534670a8809132f2d6edf2fabdb4337669342

  • C:\Users\Admin\AppData\Local\Temp\is-DBHKN.tmp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.tmp

    MD5

    0e2a6c24234dd8241d6305e1f69a0de0

    SHA1

    de1a764ff5fc23de24b6b62b8e46db301d3e06e6

    SHA256

    c9f5ad9b0c94a8727ec0af81f246a9d7505be85aacede83a59685edbd12cfd06

    SHA512

    fc58d6097032dfac9ae48e5ee0158858303c10d55850a5bfd6e033875f9fa42e3df8c082d52a4c61227c26aad676493d6d6264844453cc8e7a4bccf811f5f945

  • C:\Users\Admin\AppData\Local\Temp\j9elabCE.xlsm

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • \ProgramData\Synaptics\Synaptics.exe

    MD5

    6f8b6dfb49d636ae6a5c829ccca9cfac

    SHA1

    8d8efa3b5e918146ddcd50b75cf55989e3bf1d83

    SHA256

    638bafc4f19fbf5670372bf6cd5662938d3d36adeabc0ad5eed3b09fcb08b38a

    SHA512

    e7cc997c86a909b9f4c112e5c6c91053c34f92e628aaa6e18409284dc15857a1cfd2d1fe40193ccda2bf32d462a41f68c4b759aeca512e9dc61e962f55e25947

  • \ProgramData\Synaptics\Synaptics.exe

    MD5

    6f8b6dfb49d636ae6a5c829ccca9cfac

    SHA1

    8d8efa3b5e918146ddcd50b75cf55989e3bf1d83

    SHA256

    638bafc4f19fbf5670372bf6cd5662938d3d36adeabc0ad5eed3b09fcb08b38a

    SHA512

    e7cc997c86a909b9f4c112e5c6c91053c34f92e628aaa6e18409284dc15857a1cfd2d1fe40193ccda2bf32d462a41f68c4b759aeca512e9dc61e962f55e25947

  • \Users\Admin\AppData\Local\Temp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe

    MD5

    18b2f30c6a31484de65fda1fa3f69419

    SHA1

    94d2da9d29c38e4e45e26f107eaa75981d7c582b

    SHA256

    635f993a2d060d7c0ddc34db5c4301912ed17358113213f6cadbcc09eba3c9ec

    SHA512

    5bba69f39fb996170b18813d082ca8cd16463050b6149e3e4cc36f614acafbb39ffe5e117eeb9e8502a197ca318534670a8809132f2d6edf2fabdb4337669342

  • \Users\Admin\AppData\Local\Temp\is-DBHKN.tmp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.tmp

    MD5

    0e2a6c24234dd8241d6305e1f69a0de0

    SHA1

    de1a764ff5fc23de24b6b62b8e46db301d3e06e6

    SHA256

    c9f5ad9b0c94a8727ec0af81f246a9d7505be85aacede83a59685edbd12cfd06

    SHA512

    fc58d6097032dfac9ae48e5ee0158858303c10d55850a5bfd6e033875f9fa42e3df8c082d52a4c61227c26aad676493d6d6264844453cc8e7a4bccf811f5f945

  • \Users\Admin\AppData\Local\Temp\is-MPPRS.tmp\_isetup\_iscrypt.dll

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • memory/1268-60-0x0000000075591000-0x0000000075593000-memory.dmp

    Filesize

    8KB

  • memory/1268-61-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1396-66-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1396-63-0x0000000000000000-mapping.dmp

  • memory/1468-71-0x0000000000000000-mapping.dmp

  • memory/1468-76-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1556-72-0x0000000000000000-mapping.dmp

  • memory/1556-80-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1676-81-0x000000002F171000-0x000000002F174000-memory.dmp

    Filesize

    12KB

  • memory/1676-82-0x0000000071191000-0x0000000071193000-memory.dmp

    Filesize

    8KB

  • memory/1676-83-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB