Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    11-05-2021 13:47

General

  • Target

    a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

  • Size

    1.2MB

  • MD5

    606c3f605b2f62a58338035565560e59

  • SHA1

    ad0d39aa53704b82f3e4751b43827a872c77ae7e

  • SHA256

    a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20

  • SHA512

    13f05d3551457dc981162e296ae42b5c528b3b88a7a9e3fac5986e5cfefbd10a030fd3fb70eb13c318f8d0886f736cf78048b6510b7ea51f5c3d2b4475d4e928

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
    "C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
        "C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2024
        • C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:1772
          • C:\Windows\svchost.exe
            "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1724
            • C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
              "C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
              6⤵
              • Executes dropped EXE
              PID:840
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:1112
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    PID:1932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    MD5

    0d2b262ad7c8436dbf80f0fb87b056a8

    SHA1

    d98aeae6dddc63bf2296e9f9b15ca6bc8cad209a

    SHA256

    803e33263ee6c92104b0dad9fef8aabb418bc2368f092f997be3419299732ebe

    SHA512

    24b08ed7d80e4da851c79b631ef49abf1bb5d17a614930f91d2f46c64b64e3d071902268311928f9349a8baea51ac0faa66e8930a238923dfee38d35284aaa4b

  • C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

    MD5

    660b7895c8a78fc532e84fa9c4df9e0a

    SHA1

    d521534d94f5caae1e17b5b175692a4d06df4cc0

    SHA256

    50d86874282bd3a35b4e90cbefeb6285689f49e5157fae5b03a0322e364167f1

    SHA512

    6d7982a88ae64c6db2834fd85cb3b89ce6fe5e49d7841a66ca69396153b9cf68d47a2fb4a57b2418aa5a7d71df0f892d4b37ae5ccec18e6c5ba7b6b8c629db37

  • C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

    MD5

    660b7895c8a78fc532e84fa9c4df9e0a

    SHA1

    d521534d94f5caae1e17b5b175692a4d06df4cc0

    SHA256

    50d86874282bd3a35b4e90cbefeb6285689f49e5157fae5b03a0322e364167f1

    SHA512

    6d7982a88ae64c6db2834fd85cb3b89ce6fe5e49d7841a66ca69396153b9cf68d47a2fb4a57b2418aa5a7d71df0f892d4b37ae5ccec18e6c5ba7b6b8c629db37

  • C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

    MD5

    5963017da2ff28067a538794232714e9

    SHA1

    077739c7cde63875556a3b77d8bd5863fe0ad291

    SHA256

    7bceaa0450cac4a34b1782255aeef61868295fffa7dc8a4f7332b39d6ab41e17

    SHA512

    ed5e186bd72d784204b0aedab93547f4e0e53b7d3bab6d1c387826c2d63e9118d4486425200c6fe4bf3ac9e53ed7b09bac2aa7b246204cce5a70aee567e03c25

  • C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

    MD5

    1cee672bfe6cf54b417b17309af75fb6

    SHA1

    b9afe9b4a1c306bfc106aa319c6cc64b90c3c12f

    SHA256

    4c377a2d20b878fca4725169b508d4d34989d6b8b8815242e0379bf28eab4d96

    SHA512

    b4b00a066c1f44a744a06167f4fdcd7abfc0016c2370dc8b2224d04cdba3d00445c69f26828b2a8da83959dd4a0770c28ecf993c72a25fe3e4f4c12fce7a53b3

  • C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

    MD5

    1cee672bfe6cf54b417b17309af75fb6

    SHA1

    b9afe9b4a1c306bfc106aa319c6cc64b90c3c12f

    SHA256

    4c377a2d20b878fca4725169b508d4d34989d6b8b8815242e0379bf28eab4d96

    SHA512

    b4b00a066c1f44a744a06167f4fdcd7abfc0016c2370dc8b2224d04cdba3d00445c69f26828b2a8da83959dd4a0770c28ecf993c72a25fe3e4f4c12fce7a53b3

  • C:\Windows\svchost.exe

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • \ProgramData\Synaptics\Synaptics.exe

    MD5

    0d2b262ad7c8436dbf80f0fb87b056a8

    SHA1

    d98aeae6dddc63bf2296e9f9b15ca6bc8cad209a

    SHA256

    803e33263ee6c92104b0dad9fef8aabb418bc2368f092f997be3419299732ebe

    SHA512

    24b08ed7d80e4da851c79b631ef49abf1bb5d17a614930f91d2f46c64b64e3d071902268311928f9349a8baea51ac0faa66e8930a238923dfee38d35284aaa4b

  • \ProgramData\Synaptics\Synaptics.exe

    MD5

    0d2b262ad7c8436dbf80f0fb87b056a8

    SHA1

    d98aeae6dddc63bf2296e9f9b15ca6bc8cad209a

    SHA256

    803e33263ee6c92104b0dad9fef8aabb418bc2368f092f997be3419299732ebe

    SHA512

    24b08ed7d80e4da851c79b631ef49abf1bb5d17a614930f91d2f46c64b64e3d071902268311928f9349a8baea51ac0faa66e8930a238923dfee38d35284aaa4b

  • \Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

    MD5

    660b7895c8a78fc532e84fa9c4df9e0a

    SHA1

    d521534d94f5caae1e17b5b175692a4d06df4cc0

    SHA256

    50d86874282bd3a35b4e90cbefeb6285689f49e5157fae5b03a0322e364167f1

    SHA512

    6d7982a88ae64c6db2834fd85cb3b89ce6fe5e49d7841a66ca69396153b9cf68d47a2fb4a57b2418aa5a7d71df0f892d4b37ae5ccec18e6c5ba7b6b8c629db37

  • \Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

    MD5

    5963017da2ff28067a538794232714e9

    SHA1

    077739c7cde63875556a3b77d8bd5863fe0ad291

    SHA256

    7bceaa0450cac4a34b1782255aeef61868295fffa7dc8a4f7332b39d6ab41e17

    SHA512

    ed5e186bd72d784204b0aedab93547f4e0e53b7d3bab6d1c387826c2d63e9118d4486425200c6fe4bf3ac9e53ed7b09bac2aa7b246204cce5a70aee567e03c25

  • \Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

    MD5

    1cee672bfe6cf54b417b17309af75fb6

    SHA1

    b9afe9b4a1c306bfc106aa319c6cc64b90c3c12f

    SHA256

    4c377a2d20b878fca4725169b508d4d34989d6b8b8815242e0379bf28eab4d96

    SHA512

    b4b00a066c1f44a744a06167f4fdcd7abfc0016c2370dc8b2224d04cdba3d00445c69f26828b2a8da83959dd4a0770c28ecf993c72a25fe3e4f4c12fce7a53b3

  • \Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

    MD5

    1cee672bfe6cf54b417b17309af75fb6

    SHA1

    b9afe9b4a1c306bfc106aa319c6cc64b90c3c12f

    SHA256

    4c377a2d20b878fca4725169b508d4d34989d6b8b8815242e0379bf28eab4d96

    SHA512

    b4b00a066c1f44a744a06167f4fdcd7abfc0016c2370dc8b2224d04cdba3d00445c69f26828b2a8da83959dd4a0770c28ecf993c72a25fe3e4f4c12fce7a53b3

  • \Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

    MD5

    1cee672bfe6cf54b417b17309af75fb6

    SHA1

    b9afe9b4a1c306bfc106aa319c6cc64b90c3c12f

    SHA256

    4c377a2d20b878fca4725169b508d4d34989d6b8b8815242e0379bf28eab4d96

    SHA512

    b4b00a066c1f44a744a06167f4fdcd7abfc0016c2370dc8b2224d04cdba3d00445c69f26828b2a8da83959dd4a0770c28ecf993c72a25fe3e4f4c12fce7a53b3

  • memory/840-79-0x0000000000000000-mapping.dmp

  • memory/1112-87-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1112-83-0x0000000000000000-mapping.dmp

  • memory/1724-76-0x0000000000000000-mapping.dmp

  • memory/1772-73-0x0000000000000000-mapping.dmp

  • memory/1992-60-0x0000000000000000-mapping.dmp

  • memory/2024-67-0x00000000753E1000-0x00000000753E3000-memory.dmp

    Filesize

    8KB

  • memory/2024-65-0x0000000000000000-mapping.dmp

  • memory/2024-69-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB