Analysis
-
max time kernel
147s -
max time network
184s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-05-2021 05:27
Static task
static1
Behavioral task
behavioral1
Sample
857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe
Resource
win10v20210408
General
-
Target
857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe
-
Size
753KB
-
MD5
b4471db7c90e5cd55bd8bcc324d54602
-
SHA1
53abfd4381490d79be37f2e88c6ab378bf5be92c
-
SHA256
857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951
-
SHA512
be5668d148612713e0df1cbf6d7800af9c8145c5acd41cfef6d96c6bfbd5bdec150e3cb2e096a26962442de8dedde4290fc5766f9c2739188390a91c3391486f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Synaptics.exepid process 1312 Synaptics.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\bGcR1449.xlsm office_macros -
Loads dropped DLL 2 IoCs
Processes:
857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exepid process 520 857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe 520 857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 744 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 744 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exedescription pid process target process PID 520 wrote to memory of 1312 520 857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe Synaptics.exe PID 520 wrote to memory of 1312 520 857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe Synaptics.exe PID 520 wrote to memory of 1312 520 857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe Synaptics.exe PID 520 wrote to memory of 1312 520 857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe"C:\Users\Admin\AppData\Local\Temp\857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Synaptics\Synaptics.exeMD5
b4471db7c90e5cd55bd8bcc324d54602
SHA153abfd4381490d79be37f2e88c6ab378bf5be92c
SHA256857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951
SHA512be5668d148612713e0df1cbf6d7800af9c8145c5acd41cfef6d96c6bfbd5bdec150e3cb2e096a26962442de8dedde4290fc5766f9c2739188390a91c3391486f
-
C:\ProgramData\Synaptics\Synaptics.exeMD5
b4471db7c90e5cd55bd8bcc324d54602
SHA153abfd4381490d79be37f2e88c6ab378bf5be92c
SHA256857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951
SHA512be5668d148612713e0df1cbf6d7800af9c8145c5acd41cfef6d96c6bfbd5bdec150e3cb2e096a26962442de8dedde4290fc5766f9c2739188390a91c3391486f
-
C:\Users\Admin\AppData\Local\Temp\bGcR1449.xlsmMD5
e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
\ProgramData\Synaptics\Synaptics.exeMD5
b4471db7c90e5cd55bd8bcc324d54602
SHA153abfd4381490d79be37f2e88c6ab378bf5be92c
SHA256857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951
SHA512be5668d148612713e0df1cbf6d7800af9c8145c5acd41cfef6d96c6bfbd5bdec150e3cb2e096a26962442de8dedde4290fc5766f9c2739188390a91c3391486f
-
\ProgramData\Synaptics\Synaptics.exeMD5
b4471db7c90e5cd55bd8bcc324d54602
SHA153abfd4381490d79be37f2e88c6ab378bf5be92c
SHA256857835a98d61f311c7de3354b8c8c395905e45831b519528cf5947083d2d9951
SHA512be5668d148612713e0df1cbf6d7800af9c8145c5acd41cfef6d96c6bfbd5bdec150e3cb2e096a26962442de8dedde4290fc5766f9c2739188390a91c3391486f
-
memory/520-59-0x0000000075C31000-0x0000000075C33000-memory.dmpFilesize
8KB
-
memory/520-60-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/744-67-0x000000002FF81000-0x000000002FF84000-memory.dmpFilesize
12KB
-
memory/744-68-0x0000000071191000-0x0000000071193000-memory.dmpFilesize
8KB
-
memory/744-69-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1312-63-0x0000000000000000-mapping.dmp
-
memory/1312-66-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB