Analysis

  • max time kernel
    141s
  • max time network
    197s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    13-05-2021 04:10

General

  • Target

    bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe

  • Size

    809KB

  • MD5

    b96f5e57207529e8983cc021e1566450

  • SHA1

    a532859468e0a7e6c1552b7545b2e7084a606953

  • SHA256

    bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8

  • SHA512

    8d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious Office macro 12 IoCs

    Office document equipped with macros.

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe
    "C:\Users\Admin\AppData\Local\Temp\bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe
      "C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:468
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C schtasks /QUERY /TN "Google Chrome Helper Update"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:568
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /QUERY /TN "Google Chrome Helper Update"
          4⤵
            PID:572
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C schtasks /CREATE /XML "C:\Users\Admin\AppData\Local\Temp\WU8.xml" /TN "Google Chrome Helper Update"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /CREATE /XML "C:\Users\Admin\AppData\Local\Temp\WU8.xml" /TN "Google Chrome Helper Update"
            4⤵
            • Creates scheduled task(s)
            PID:1016
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1508
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      1⤵
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      PID:1700

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe

      MD5

      b96f5e57207529e8983cc021e1566450

      SHA1

      a532859468e0a7e6c1552b7545b2e7084a606953

      SHA256

      bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8

      SHA512

      8d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0

    • C:\Users\Admin\AppData\Local\Temp\AUIMc.xlsm

      MD5

      c27fd49e4373a21fe085f4c701db9527

      SHA1

      e4bd4087e5c539d69c3c887bc68fe57fb4f3e4c1

      SHA256

      ef7e9279f5498098cd9595ec1e0c41ddf970fbceaedec242ec6360cd81e31fb5

      SHA512

      53075ad780b42459db236d84f97a45c747a8c9e23779503af39357b719501c021296145e7548a0b46957834ae152beaa85dc3349bf90840e08a3721b8d775778

    • C:\Users\Admin\AppData\Local\Temp\AUIMc.xlsm

      MD5

      a9fdc9a36bdb93e518ec59ee54d42e2e

      SHA1

      aa522a435e5be442187a32bee5f2177dda2fdcc3

      SHA256

      2a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a

      SHA512

      79f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8

    • C:\Users\Admin\AppData\Local\Temp\Bayl7.docm

      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\LSI1m.docm

      MD5

      2c9642ebb48eff43ac10d7928b7320f8

      SHA1

      fad7478e9669cfb3fc0a65f8e945feac9187adeb

      SHA256

      4d6aac62a917dc0eeebea7adba7c7176ca6467aed3e9316b3cfd6a2130224aca

      SHA512

      0c1e6e01debd73afeef41e04ea3c541df8fbbcb9d6c75455c0cc755a347e119732c4eefe4ff3c8211e8b65318d02e1853e11ae230aa752e64ca6d912df0847d6

    • C:\Users\Admin\AppData\Local\Temp\LSI1m.docm

      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\LUsRu.docm

      MD5

      03345e2f00a9057087e9ca85f58683e0

      SHA1

      92333f9f878f115556daa63e847ac763d508f560

      SHA256

      b87099c823bf57310492b740e849c7015356bcefeb68e8e191ff359d8e604169

      SHA512

      9cdf50657c647bd24f16f7885da7e35ce0f5ff462776799c622081145cb8f17c9f6554cb61140db7c63b65095bdd20404fa8776ba7ad296740301d5d886ebd72

    • C:\Users\Admin\AppData\Local\Temp\LUsRu.docm

      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\NMlFV.xlsm

      MD5

      8a513b7457ef2935aad9e19c68cda163

      SHA1

      37641a9908a204616f859e6ce0733ff5b0578c99

      SHA256

      016ef1a41028869da91558be00e39f8c4159c05bc0b6a52aa68707778a9e45f2

      SHA512

      8558a5a25efa6ded4d77ae128a6459a3e13979892aadf1fac1d14cbe06a4059559d3baa24557beedcb91a2edfa1f90ce6d085deebcccff2d995823a3da30a30e

    • C:\Users\Admin\AppData\Local\Temp\NMlFV.xlsm

      MD5

      a9fdc9a36bdb93e518ec59ee54d42e2e

      SHA1

      aa522a435e5be442187a32bee5f2177dda2fdcc3

      SHA256

      2a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a

      SHA512

      79f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8

    • C:\Users\Admin\AppData\Local\Temp\PAJQa.xlsm

      MD5

      1e462087935710c3e125d2f95ff62e21

      SHA1

      0d86bcc16a37bc7114f3a1f153e491f664db7685

      SHA256

      626c4a5aaed137b283a3f70cc3411c5272efe7d61e6a49bc38540c82ac20de7b

      SHA512

      3b2d6ae12821f981327e037f3a67dc07381049206141e3649bc40aec00f82f01e395e0efbc651a1ee8d36bae34010214914febdfed316bc7ee5b1106ee5a2549

    • C:\Users\Admin\AppData\Local\Temp\PAJQa.xlsm

      MD5

      a9fdc9a36bdb93e518ec59ee54d42e2e

      SHA1

      aa522a435e5be442187a32bee5f2177dda2fdcc3

      SHA256

      2a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a

      SHA512

      79f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8

    • C:\Users\Admin\AppData\Local\Temp\VpOAU.docm

      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\VpOAU.docm

      MD5

      795be0a4f698fa8ebb734c42821cdc8a

      SHA1

      46ea9bba3813e9089f80c8ddb1d1497044a11e55

      SHA256

      3847bbdcc4a1410e7eb0df7d12741f3426c00a4031d36e1b9668a5b773071c69

      SHA512

      98de96c8a72946528654b6c0e06306fd41da1abe19057281fdfe13ed51c7896ae9097cb699ecf1ddd59e53e541bc78afaa9a96e90ca5d41703f0d172a2b8565e

    • C:\Users\Admin\AppData\Local\Temp\WU8.xml

      MD5

      d4a6c30fda3d2f86a28c11f21db1be50

      SHA1

      91ba5672247f48bbd4ca4daf35b17dd09ef5c6da

      SHA256

      2fd15bec9a1582b5d9f0214e73c31cd935417114eef6d21cfd768bc9e9a12f3e

      SHA512

      9b4de3b814e1b22c3d09599b333b3ab7e8b157e3f61007cfe347d88bba6aa666592393e9c73ae0449e155fd7a949f1eee9ef58d58a33cbb69fe4092158c2b21b

    • C:\Users\Admin\AppData\Local\Temp\hgI2a.docm

      MD5

      a10b4863ee0af468d14bc6240ffe1b5e

      SHA1

      b1e56e672c3fd8f0dd23548907b727ed24d70bf8

      SHA256

      e0d2b44581ef1711c4743879340daa413443d1d572ee06b5eb7a6c45eaf012ec

      SHA512

      5a4d4b48dabcbea2e8e425aad063cfffecd0aec44d83985c418d7992929c6f218dd49cfeb826bd44bc8eaf5555d7557d4c7448c30c4f80229db44db492c6d8a7

    • C:\Users\Admin\AppData\Local\Temp\hgI2a.docm

      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      MD5

      452de22fa48eed260ae851f4ee65165a

      SHA1

      886e08a77be0b87daf14c13ae0224e45966aa3b8

      SHA256

      17a204b30e3d657ea0195bb99eff2989698c4934164970efad76f5f164b68399

      SHA512

      b781ab3f6a7b9f77f636b90659d50b62f44d28ad595aa97f63a421287082079dd169c7f7f2887312c268219da4885da7da2dd0bb714e0f971e2697e32bc2f5a0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      MD5

      0de847bff07b50b707a30239120e2c7f

      SHA1

      52d073d9bea7eeb9560d594556bf78ede7b4e947

      SHA256

      3eb15160becd01f6c489f0769987d96c20140bb37bc42b0c0c7ebdff810169fd

      SHA512

      22bc1c4fa2ed0055ddf01767dcb1c48ba80f9829d9a2f6b32dcdf7cc443c2fb1c0e5acec225569fef3767698e272111d806e043d6202233f7693ea6f60a042cc

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      MD5

      b86f64bc64b13686847a15604e154987

      SHA1

      875933ab6a676a0410384bd9bd11dc808d35da29

      SHA256

      06ff97986fcb152b8236c18ff747551c1f7922a3272c8fafb5c862767a7ec106

      SHA512

      19d1a28b3b6298181279b674930834d247d0a8fa2f4ea627ced0b150e45da0c470025b06621e7a7c0ae200ea29512cd2b80a866733db68863a96677e5d735ce6

    • \Program Files (x86)\Google Chrome Helper\chromehelper.exe

      MD5

      b96f5e57207529e8983cc021e1566450

      SHA1

      a532859468e0a7e6c1552b7545b2e7084a606953

      SHA256

      bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8

      SHA512

      8d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0

    • \Program Files (x86)\Google Chrome Helper\chromehelper.exe

      MD5

      b96f5e57207529e8983cc021e1566450

      SHA1

      a532859468e0a7e6c1552b7545b2e7084a606953

      SHA256

      bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8

      SHA512

      8d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0

    • memory/468-63-0x0000000000000000-mapping.dmp

    • memory/468-66-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/568-67-0x0000000000000000-mapping.dmp

    • memory/572-68-0x0000000000000000-mapping.dmp

    • memory/1016-70-0x0000000000000000-mapping.dmp

    • memory/1508-72-0x00000000722D1000-0x00000000722D4000-memory.dmp

      Filesize

      12KB

    • memory/1508-73-0x000000006FD51000-0x000000006FD53000-memory.dmp

      Filesize

      8KB

    • memory/1508-74-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1628-69-0x0000000000000000-mapping.dmp

    • memory/1700-77-0x000000002FBE1000-0x000000002FBE4000-memory.dmp

      Filesize

      12KB

    • memory/1988-59-0x0000000075AD1000-0x0000000075AD3000-memory.dmp

      Filesize

      8KB

    • memory/1988-60-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB