Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    11-05-2021 13:47

General

  • Target

    a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe

  • Size

    1.2MB

  • MD5

    606c3f605b2f62a58338035565560e59

  • SHA1

    ad0d39aa53704b82f3e4751b43827a872c77ae7e

  • SHA256

    a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20

  • SHA512

    13f05d3551457dc981162e296ae42b5c528b3b88a7a9e3fac5986e5cfefbd10a030fd3fb70eb13c318f8d0886f736cf78048b6510b7ea51f5c3d2b4475d4e928

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 50 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
    "C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3880
      • C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
        "C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Windows\svchost.exe
            "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2948
            • C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
              "C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe"
              6⤵
              • Executes dropped EXE
              PID:3752
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:2724
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:1648
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    0d2b262ad7c8436dbf80f0fb87b056a8

    SHA1

    d98aeae6dddc63bf2296e9f9b15ca6bc8cad209a

    SHA256

    803e33263ee6c92104b0dad9fef8aabb418bc2368f092f997be3419299732ebe

    SHA512

    24b08ed7d80e4da851c79b631ef49abf1bb5d17a614930f91d2f46c64b64e3d071902268311928f9349a8baea51ac0faa66e8930a238923dfee38d35284aaa4b

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    0d2b262ad7c8436dbf80f0fb87b056a8

    SHA1

    d98aeae6dddc63bf2296e9f9b15ca6bc8cad209a

    SHA256

    803e33263ee6c92104b0dad9fef8aabb418bc2368f092f997be3419299732ebe

    SHA512

    24b08ed7d80e4da851c79b631ef49abf1bb5d17a614930f91d2f46c64b64e3d071902268311928f9349a8baea51ac0faa66e8930a238923dfee38d35284aaa4b

  • C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
    MD5

    167e5073b2a12ee92e6581f6db67165e

    SHA1

    6529dfb33da410a959def23f52b470a4a64e7a7a

    SHA256

    464cd4f410efa212eed91050977abc7a04efc32b5b422504933c862d0ae17b3c

    SHA512

    91eb41d32b9646eeb18f7938788bf9713df98accf608679812c21604b30d6deb4d05f11b9128f9694c3fb708a6f8ae9fc334cf7c42aa27566669c09f1ae55b8d

  • C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
    MD5

    6ba84c727afb32b5370f0d1c7548cd41

    SHA1

    6430cf1d3b586734a3dba5d3fbfc64f305a161c5

    SHA256

    48ba747de54666642681c183c14d2e80591d90241dc6e0517869b2a5a4080b54

    SHA512

    ea96ccb59ea2506ba10211777751889541a1153b79242cad9acb6f675e913ad75e892cb4a41e39078d337b174cac75feb5647027f4fc9e4894c98aab39a87632

  • C:\Users\Admin\AppData\Local\Temp\._cache_a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
    MD5

    5963017da2ff28067a538794232714e9

    SHA1

    077739c7cde63875556a3b77d8bd5863fe0ad291

    SHA256

    7bceaa0450cac4a34b1782255aeef61868295fffa7dc8a4f7332b39d6ab41e17

    SHA512

    ed5e186bd72d784204b0aedab93547f4e0e53b7d3bab6d1c387826c2d63e9118d4486425200c6fe4bf3ac9e53ed7b09bac2aa7b246204cce5a70aee567e03c25

  • C:\Users\Admin\AppData\Local\Temp\VgdcB1Oy.xlsm
    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
    MD5

    1cee672bfe6cf54b417b17309af75fb6

    SHA1

    b9afe9b4a1c306bfc106aa319c6cc64b90c3c12f

    SHA256

    4c377a2d20b878fca4725169b508d4d34989d6b8b8815242e0379bf28eab4d96

    SHA512

    b4b00a066c1f44a744a06167f4fdcd7abfc0016c2370dc8b2224d04cdba3d00445c69f26828b2a8da83959dd4a0770c28ecf993c72a25fe3e4f4c12fce7a53b3

  • C:\Users\Admin\AppData\Local\Temp\a750c71a015b62d8d23b799cd269118539ce0359699ccac41daa4b161c9c5c20.exe
    MD5

    1cee672bfe6cf54b417b17309af75fb6

    SHA1

    b9afe9b4a1c306bfc106aa319c6cc64b90c3c12f

    SHA256

    4c377a2d20b878fca4725169b508d4d34989d6b8b8815242e0379bf28eab4d96

    SHA512

    b4b00a066c1f44a744a06167f4fdcd7abfc0016c2370dc8b2224d04cdba3d00445c69f26828b2a8da83959dd4a0770c28ecf993c72a25fe3e4f4c12fce7a53b3

  • C:\Windows\svchost.exe
    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe
    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe
    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe
    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • memory/764-120-0x0000000002430000-0x0000000002431000-memory.dmp
    Filesize

    4KB

  • memory/764-117-0x0000000000000000-mapping.dmp
  • memory/1324-135-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp
    Filesize

    64KB

  • memory/1324-136-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp
    Filesize

    64KB

  • memory/1324-142-0x00007FFD4A460000-0x00007FFD4C355000-memory.dmp
    Filesize

    31.0MB

  • memory/1324-141-0x00007FFD4C360000-0x00007FFD4D44E000-memory.dmp
    Filesize

    16.9MB

  • memory/1324-138-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp
    Filesize

    64KB

  • memory/1324-133-0x00007FF613D80000-0x00007FF617336000-memory.dmp
    Filesize

    53.7MB

  • memory/1324-134-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp
    Filesize

    64KB

  • memory/1324-137-0x00007FFD2ADC0000-0x00007FFD2ADD0000-memory.dmp
    Filesize

    64KB

  • memory/2416-121-0x0000000000000000-mapping.dmp
  • memory/2724-129-0x0000000000000000-mapping.dmp
  • memory/2724-132-0x0000000001FD0000-0x0000000001FD1000-memory.dmp
    Filesize

    4KB

  • memory/2948-124-0x0000000000000000-mapping.dmp
  • memory/3752-127-0x0000000000000000-mapping.dmp
  • memory/3880-114-0x0000000000000000-mapping.dmp