Analysis
-
max time kernel
141s -
max time network
197s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-05-2021 04:10
Static task
static1
Behavioral task
behavioral1
Sample
bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe
Resource
win10v20210410
General
-
Target
bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe
-
Size
809KB
-
MD5
b96f5e57207529e8983cc021e1566450
-
SHA1
a532859468e0a7e6c1552b7545b2e7084a606953
-
SHA256
bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8
-
SHA512
8d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
chromehelper.exepid process 468 chromehelper.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\VpOAU.docm office_macros C:\Users\Admin\AppData\Local\Temp\VpOAU.docm office_macros C:\Users\Admin\AppData\Local\Temp\NMlFV.xlsm office_macros C:\Users\Admin\AppData\Local\Temp\LSI1m.docm office_macros C:\Users\Admin\AppData\Local\Temp\LSI1m.docm office_macros C:\Users\Admin\AppData\Local\Temp\LUsRu.docm office_macros C:\Users\Admin\AppData\Local\Temp\LUsRu.docm office_macros C:\Users\Admin\AppData\Local\Temp\hgI2a.docm office_macros C:\Users\Admin\AppData\Local\Temp\hgI2a.docm office_macros C:\Users\Admin\AppData\Local\Temp\AUIMc.xlsm office_macros C:\Users\Admin\AppData\Local\Temp\PAJQa.xlsm office_macros C:\Users\Admin\AppData\Local\Temp\Bayl7.docm office_macros -
Loads dropped DLL 2 IoCs
Processes:
bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exepid process 1988 bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe 1988 bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
chromehelper.exedescription ioc process File opened (read-only) \??\A: chromehelper.exe File opened (read-only) \??\B: chromehelper.exe -
Drops file in Program Files directory 3 IoCs
Processes:
bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exedescription ioc process File opened for modification C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe File opened for modification C:\Program Files (x86)\Google Chrome Helper bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe File created C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1508 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exechromehelper.exepid process 1988 bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe 468 chromehelper.exe 468 chromehelper.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
WINWORD.EXEEXCEL.EXEpid process 1508 WINWORD.EXE 1508 WINWORD.EXE 1700 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exechromehelper.execmd.execmd.exedescription pid process target process PID 1988 wrote to memory of 468 1988 bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe chromehelper.exe PID 1988 wrote to memory of 468 1988 bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe chromehelper.exe PID 1988 wrote to memory of 468 1988 bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe chromehelper.exe PID 1988 wrote to memory of 468 1988 bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe chromehelper.exe PID 468 wrote to memory of 568 468 chromehelper.exe cmd.exe PID 468 wrote to memory of 568 468 chromehelper.exe cmd.exe PID 468 wrote to memory of 568 468 chromehelper.exe cmd.exe PID 468 wrote to memory of 568 468 chromehelper.exe cmd.exe PID 568 wrote to memory of 572 568 cmd.exe schtasks.exe PID 568 wrote to memory of 572 568 cmd.exe schtasks.exe PID 568 wrote to memory of 572 568 cmd.exe schtasks.exe PID 568 wrote to memory of 572 568 cmd.exe schtasks.exe PID 468 wrote to memory of 1628 468 chromehelper.exe cmd.exe PID 468 wrote to memory of 1628 468 chromehelper.exe cmd.exe PID 468 wrote to memory of 1628 468 chromehelper.exe cmd.exe PID 468 wrote to memory of 1628 468 chromehelper.exe cmd.exe PID 1628 wrote to memory of 1016 1628 cmd.exe schtasks.exe PID 1628 wrote to memory of 1016 1628 cmd.exe schtasks.exe PID 1628 wrote to memory of 1016 1628 cmd.exe schtasks.exe PID 1628 wrote to memory of 1016 1628 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe"C:\Users\Admin\AppData\Local\Temp\bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe"C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /QUERY /TN "Google Chrome Helper Update"3⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\schtasks.exeschtasks /QUERY /TN "Google Chrome Helper Update"4⤵PID:572
-
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /CREATE /XML "C:\Users\Admin\AppData\Local\Temp\WU8.xml" /TN "Google Chrome Helper Update"3⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /XML "C:\Users\Admin\AppData\Local\Temp\WU8.xml" /TN "Google Chrome Helper Update"4⤵
- Creates scheduled task(s)
PID:1016
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1508
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:1700
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b96f5e57207529e8983cc021e1566450
SHA1a532859468e0a7e6c1552b7545b2e7084a606953
SHA256bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8
SHA5128d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0
-
MD5
c27fd49e4373a21fe085f4c701db9527
SHA1e4bd4087e5c539d69c3c887bc68fe57fb4f3e4c1
SHA256ef7e9279f5498098cd9595ec1e0c41ddf970fbceaedec242ec6360cd81e31fb5
SHA51253075ad780b42459db236d84f97a45c747a8c9e23779503af39357b719501c021296145e7548a0b46957834ae152beaa85dc3349bf90840e08a3721b8d775778
-
MD5
a9fdc9a36bdb93e518ec59ee54d42e2e
SHA1aa522a435e5be442187a32bee5f2177dda2fdcc3
SHA2562a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a
SHA51279f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8
-
MD5
9496073ea504163f93ecae5cf9eda5ab
SHA1e1dd890e3390488407ea07bae6043d6079bdeb04
SHA256633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959
SHA512f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9
-
MD5
2c9642ebb48eff43ac10d7928b7320f8
SHA1fad7478e9669cfb3fc0a65f8e945feac9187adeb
SHA2564d6aac62a917dc0eeebea7adba7c7176ca6467aed3e9316b3cfd6a2130224aca
SHA5120c1e6e01debd73afeef41e04ea3c541df8fbbcb9d6c75455c0cc755a347e119732c4eefe4ff3c8211e8b65318d02e1853e11ae230aa752e64ca6d912df0847d6
-
MD5
9496073ea504163f93ecae5cf9eda5ab
SHA1e1dd890e3390488407ea07bae6043d6079bdeb04
SHA256633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959
SHA512f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9
-
MD5
03345e2f00a9057087e9ca85f58683e0
SHA192333f9f878f115556daa63e847ac763d508f560
SHA256b87099c823bf57310492b740e849c7015356bcefeb68e8e191ff359d8e604169
SHA5129cdf50657c647bd24f16f7885da7e35ce0f5ff462776799c622081145cb8f17c9f6554cb61140db7c63b65095bdd20404fa8776ba7ad296740301d5d886ebd72
-
MD5
9496073ea504163f93ecae5cf9eda5ab
SHA1e1dd890e3390488407ea07bae6043d6079bdeb04
SHA256633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959
SHA512f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9
-
MD5
8a513b7457ef2935aad9e19c68cda163
SHA137641a9908a204616f859e6ce0733ff5b0578c99
SHA256016ef1a41028869da91558be00e39f8c4159c05bc0b6a52aa68707778a9e45f2
SHA5128558a5a25efa6ded4d77ae128a6459a3e13979892aadf1fac1d14cbe06a4059559d3baa24557beedcb91a2edfa1f90ce6d085deebcccff2d995823a3da30a30e
-
MD5
a9fdc9a36bdb93e518ec59ee54d42e2e
SHA1aa522a435e5be442187a32bee5f2177dda2fdcc3
SHA2562a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a
SHA51279f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8
-
MD5
1e462087935710c3e125d2f95ff62e21
SHA10d86bcc16a37bc7114f3a1f153e491f664db7685
SHA256626c4a5aaed137b283a3f70cc3411c5272efe7d61e6a49bc38540c82ac20de7b
SHA5123b2d6ae12821f981327e037f3a67dc07381049206141e3649bc40aec00f82f01e395e0efbc651a1ee8d36bae34010214914febdfed316bc7ee5b1106ee5a2549
-
MD5
a9fdc9a36bdb93e518ec59ee54d42e2e
SHA1aa522a435e5be442187a32bee5f2177dda2fdcc3
SHA2562a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a
SHA51279f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8
-
MD5
9496073ea504163f93ecae5cf9eda5ab
SHA1e1dd890e3390488407ea07bae6043d6079bdeb04
SHA256633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959
SHA512f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9
-
MD5
795be0a4f698fa8ebb734c42821cdc8a
SHA146ea9bba3813e9089f80c8ddb1d1497044a11e55
SHA2563847bbdcc4a1410e7eb0df7d12741f3426c00a4031d36e1b9668a5b773071c69
SHA51298de96c8a72946528654b6c0e06306fd41da1abe19057281fdfe13ed51c7896ae9097cb699ecf1ddd59e53e541bc78afaa9a96e90ca5d41703f0d172a2b8565e
-
MD5
d4a6c30fda3d2f86a28c11f21db1be50
SHA191ba5672247f48bbd4ca4daf35b17dd09ef5c6da
SHA2562fd15bec9a1582b5d9f0214e73c31cd935417114eef6d21cfd768bc9e9a12f3e
SHA5129b4de3b814e1b22c3d09599b333b3ab7e8b157e3f61007cfe347d88bba6aa666592393e9c73ae0449e155fd7a949f1eee9ef58d58a33cbb69fe4092158c2b21b
-
MD5
a10b4863ee0af468d14bc6240ffe1b5e
SHA1b1e56e672c3fd8f0dd23548907b727ed24d70bf8
SHA256e0d2b44581ef1711c4743879340daa413443d1d572ee06b5eb7a6c45eaf012ec
SHA5125a4d4b48dabcbea2e8e425aad063cfffecd0aec44d83985c418d7992929c6f218dd49cfeb826bd44bc8eaf5555d7557d4c7448c30c4f80229db44db492c6d8a7
-
MD5
9496073ea504163f93ecae5cf9eda5ab
SHA1e1dd890e3390488407ea07bae6043d6079bdeb04
SHA256633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959
SHA512f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9
-
MD5
452de22fa48eed260ae851f4ee65165a
SHA1886e08a77be0b87daf14c13ae0224e45966aa3b8
SHA25617a204b30e3d657ea0195bb99eff2989698c4934164970efad76f5f164b68399
SHA512b781ab3f6a7b9f77f636b90659d50b62f44d28ad595aa97f63a421287082079dd169c7f7f2887312c268219da4885da7da2dd0bb714e0f971e2697e32bc2f5a0
-
MD5
0de847bff07b50b707a30239120e2c7f
SHA152d073d9bea7eeb9560d594556bf78ede7b4e947
SHA2563eb15160becd01f6c489f0769987d96c20140bb37bc42b0c0c7ebdff810169fd
SHA51222bc1c4fa2ed0055ddf01767dcb1c48ba80f9829d9a2f6b32dcdf7cc443c2fb1c0e5acec225569fef3767698e272111d806e043d6202233f7693ea6f60a042cc
-
MD5
b86f64bc64b13686847a15604e154987
SHA1875933ab6a676a0410384bd9bd11dc808d35da29
SHA25606ff97986fcb152b8236c18ff747551c1f7922a3272c8fafb5c862767a7ec106
SHA51219d1a28b3b6298181279b674930834d247d0a8fa2f4ea627ced0b150e45da0c470025b06621e7a7c0ae200ea29512cd2b80a866733db68863a96677e5d735ce6
-
MD5
b96f5e57207529e8983cc021e1566450
SHA1a532859468e0a7e6c1552b7545b2e7084a606953
SHA256bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8
SHA5128d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0
-
MD5
b96f5e57207529e8983cc021e1566450
SHA1a532859468e0a7e6c1552b7545b2e7084a606953
SHA256bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8
SHA5128d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0