Analysis

  • max time kernel
    129s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    11-05-2021 14:34

General

  • Target

    cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe

  • Size

    10.2MB

  • MD5

    1e38cc018755dbfa12d0775c2d591675

  • SHA1

    1ad7aa9bf01619a6d93e1314056f68af9d66e790

  • SHA256

    cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e

  • SHA512

    bdac9c005a2665d7114a70a2414f8d97d0630342700d3315232003de79bc01e521a0c97c8c9e7dc34b9b14503b6a188e79199b5ad81128a87657f5f021362dc7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe
    "C:\Users\Admin\AppData\Local\Temp\cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Users\Admin\AppData\Local\Temp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Users\Admin\AppData\Local\Temp\is-FSA2P.tmp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-FSA2P.tmp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.tmp" /SL5="$6004C,9484847,477184,C:\Users\Admin\AppData\Local\Temp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1928
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    6f8b6dfb49d636ae6a5c829ccca9cfac

    SHA1

    8d8efa3b5e918146ddcd50b75cf55989e3bf1d83

    SHA256

    638bafc4f19fbf5670372bf6cd5662938d3d36adeabc0ad5eed3b09fcb08b38a

    SHA512

    e7cc997c86a909b9f4c112e5c6c91053c34f92e628aaa6e18409284dc15857a1cfd2d1fe40193ccda2bf32d462a41f68c4b759aeca512e9dc61e962f55e25947

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    6f8b6dfb49d636ae6a5c829ccca9cfac

    SHA1

    8d8efa3b5e918146ddcd50b75cf55989e3bf1d83

    SHA256

    638bafc4f19fbf5670372bf6cd5662938d3d36adeabc0ad5eed3b09fcb08b38a

    SHA512

    e7cc997c86a909b9f4c112e5c6c91053c34f92e628aaa6e18409284dc15857a1cfd2d1fe40193ccda2bf32d462a41f68c4b759aeca512e9dc61e962f55e25947

  • C:\Users\Admin\AppData\Local\Temp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe
    MD5

    18b2f30c6a31484de65fda1fa3f69419

    SHA1

    94d2da9d29c38e4e45e26f107eaa75981d7c582b

    SHA256

    635f993a2d060d7c0ddc34db5c4301912ed17358113213f6cadbcc09eba3c9ec

    SHA512

    5bba69f39fb996170b18813d082ca8cd16463050b6149e3e4cc36f614acafbb39ffe5e117eeb9e8502a197ca318534670a8809132f2d6edf2fabdb4337669342

  • C:\Users\Admin\AppData\Local\Temp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.exe
    MD5

    18b2f30c6a31484de65fda1fa3f69419

    SHA1

    94d2da9d29c38e4e45e26f107eaa75981d7c582b

    SHA256

    635f993a2d060d7c0ddc34db5c4301912ed17358113213f6cadbcc09eba3c9ec

    SHA512

    5bba69f39fb996170b18813d082ca8cd16463050b6149e3e4cc36f614acafbb39ffe5e117eeb9e8502a197ca318534670a8809132f2d6edf2fabdb4337669342

  • C:\Users\Admin\AppData\Local\Temp\is-FSA2P.tmp\._cache_cde7ddad49de857b3ec3f34795e4a8c991a18f535df5e0da8a107b4e311abf7e.tmp
    MD5

    0e2a6c24234dd8241d6305e1f69a0de0

    SHA1

    de1a764ff5fc23de24b6b62b8e46db301d3e06e6

    SHA256

    c9f5ad9b0c94a8727ec0af81f246a9d7505be85aacede83a59685edbd12cfd06

    SHA512

    fc58d6097032dfac9ae48e5ee0158858303c10d55850a5bfd6e033875f9fa42e3df8c082d52a4c61227c26aad676493d6d6264844453cc8e7a4bccf811f5f945

  • \Users\Admin\AppData\Local\Temp\is-SVGT7.tmp\_isetup\_iscrypt.dll
    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • memory/1504-117-0x0000000000400000-0x000000000047E000-memory.dmp
    Filesize

    504KB

  • memory/1504-115-0x0000000000000000-mapping.dmp
  • memory/1928-119-0x0000000000000000-mapping.dmp
  • memory/1928-126-0x0000000000680000-0x00000000007CA000-memory.dmp
    Filesize

    1.3MB

  • memory/2076-121-0x0000000000000000-mapping.dmp
  • memory/2076-127-0x00000000004D0000-0x000000000061A000-memory.dmp
    Filesize

    1.3MB

  • memory/3904-114-0x0000000001090000-0x0000000001091000-memory.dmp
    Filesize

    4KB