Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    13-05-2021 04:10

General

  • Target

    bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe

  • Size

    809KB

  • MD5

    b96f5e57207529e8983cc021e1566450

  • SHA1

    a532859468e0a7e6c1552b7545b2e7084a606953

  • SHA256

    bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8

  • SHA512

    8d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious Office macro 13 IoCs

    Office document equipped with macros.

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 47 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe
    "C:\Users\Admin\AppData\Local\Temp\bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe
      "C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C schtasks /QUERY /TN "Google Chrome Helper Update"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3276
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /QUERY /TN "Google Chrome Helper Update"
          4⤵
            PID:3924
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C schtasks /CREATE /XML "C:\Users\Admin\AppData\Local\Temp\388.xml" /TN "Google Chrome Helper Update"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1852
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /CREATE /XML "C:\Users\Admin\AppData\Local\Temp\388.xml" /TN "Google Chrome Helper Update"
            4⤵
            • Creates scheduled task(s)
            PID:1116
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2124
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      PID:3004

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe

      MD5

      b96f5e57207529e8983cc021e1566450

      SHA1

      a532859468e0a7e6c1552b7545b2e7084a606953

      SHA256

      bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8

      SHA512

      8d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0

    • C:\Program Files (x86)\Google Chrome Helper\chromehelper.exe

      MD5

      b96f5e57207529e8983cc021e1566450

      SHA1

      a532859468e0a7e6c1552b7545b2e7084a606953

      SHA256

      bddf9d12ecc75c909b9e6955dca7f49427ff9d1d68b180c5871d3d34e967d4f8

      SHA512

      8d7e5fabc874d49170619406bb066cb0325a84dc26e315b97b1da5d3b65dc96c3e8928ce6832a4f5fa232868a21284e4eddbb28cf67fc54f1b864d4d0b7161f0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868

      MD5

      3b3a2119f3ec1d14d99c0782d02b9302

      SHA1

      4d1a96c33964e62457c20f25b9a0d8130641ddb4

      SHA256

      ee78240203df88f587c055a906e7a44ecbd1f332a1ab639ba426df89d6373c69

      SHA512

      b5d499979be65979fb00d9c95d83671d23dc06302e59469e443259f35fd96f1cba868330645fa12ef87a8f8c748cd305b7862b32bb495f2440828a2b406b7d9d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868

      MD5

      894cb032e6937bf4d9dee0060e53d66b

      SHA1

      c282ce0310f729908a92f6807751f98fc769052e

      SHA256

      67d1d5c337ea637aa4bc36495396e5db963c4406c6e97381d059e4fecd176300

      SHA512

      048bd30a3c960198f907c9d9b20109e5d003a250b67c439bf0965566f03d79ba2180fc7866ea201eede2e192c6306d0adc5c1131aa8cb9cea4be49f069924e38

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\849746FA-6BDE-490F-81FE-52ADC557E5DE

      MD5

      1c5f983b9a971d7f9ed68420950c0a20

      SHA1

      4dd502a726a8a651c961a16669dec7d8758f71f9

      SHA256

      a59fd5149469edbc259fc4d941cff26292f41431ff2dd22fbd0b37431f380537

      SHA512

      1c613388eb8baaa4957e5c610c96abd09b36370449e450bd9dd49e41ff2cb6e40b72b82bc7151172f99d042b9e771d2d0a29bb736da8310dd677785797e006f7

    • C:\Users\Admin\AppData\Local\Temp\388.xml

      MD5

      d4a6c30fda3d2f86a28c11f21db1be50

      SHA1

      91ba5672247f48bbd4ca4daf35b17dd09ef5c6da

      SHA256

      2fd15bec9a1582b5d9f0214e73c31cd935417114eef6d21cfd768bc9e9a12f3e

      SHA512

      9b4de3b814e1b22c3d09599b333b3ab7e8b157e3f61007cfe347d88bba6aa666592393e9c73ae0449e155fd7a949f1eee9ef58d58a33cbb69fe4092158c2b21b

    • C:\Users\Admin\AppData\Local\Temp\7Wyuj.docm

      MD5

      3bb5a7881be8b4e6a2a0546e1b1df142

      SHA1

      c3528c490954d54488f1931d47dfeb7088aef331

      SHA256

      ba3d0e20240ae17174adcda2208fe3c4779b1d376143ca1ad6f8d79aa0f157b8

      SHA512

      ad54cad80e96f92a33ce1c434490cfebe917df4002712eb1bf6abaa8b2e8b79ba349418568aca46fd08f780bc8cbafde370e26ad4dc0a7529663710ad6221d3c

    • C:\Users\Admin\AppData\Local\Temp\7Wyuj.docm

      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\Bovcw.xlsm

      MD5

      a9fdc9a36bdb93e518ec59ee54d42e2e

      SHA1

      aa522a435e5be442187a32bee5f2177dda2fdcc3

      SHA256

      2a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a

      SHA512

      79f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8

    • C:\Users\Admin\AppData\Local\Temp\Bovcw.xlsm

      MD5

      0c7c8797002e8627781d316b9a2ddff7

      SHA1

      a71e36ffbddd11d699a323948528c6f9ab00d72f

      SHA256

      d4093df5294560ccc49531e0142434a3265b9896e83a723e5d9a708df1cca9a3

      SHA512

      029e411e4b0de292efeb76fe74ea4d9477b1dbea94dba5ed3c6691bdc9dbe05746cc3ccc96c0b5ddf49f64c580b8404b7e2a40b86842c6fb5c6af89299dd6f66

    • C:\Users\Admin\AppData\Local\Temp\DcurS.docm

      MD5

      69b19507dcbe001efeea8f09a0992dfc

      SHA1

      4093d832ee4b293c7ae789c1db62139812aa3a7e

      SHA256

      3ae101eef372504cd27126943b3699a5904aabe6b8436b67ffd3c90f1501f5d8

      SHA512

      e449fecfbc5f554e5c02fa707835bdafc77da339d251fb01a0a5a4dd613386713a9f8c639851f8ab01193b2c960cb2da39bdcb560475d068c934ea92227d70b8

    • C:\Users\Admin\AppData\Local\Temp\DcurS.docm

      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\bp9mC.docm

      MD5

      0f5fc28711e491f544e62b0e95634c59

      SHA1

      7925524eb16e148ba1f98b2b2b39147ba46c9d58

      SHA256

      f62c516b5160a6bf2fb4f209ea6243e077cd401b10a8845f0471791694dc1b92

      SHA512

      d3c78bcd67057c3571d59d8f5d192aeadbb31b39e73475ccfc41399f7078e92e82c68a3608a487fa346558fcd9cadcf02c9011c859492e7167ce119d1c728cb7

    • C:\Users\Admin\AppData\Local\Temp\bp9mC.docm

      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\d12vf.docm

      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\d12vf.docm

      MD5

      49a21779f278bd11b65b9ac51907d4fc

      SHA1

      c05335e0739570063a07c0526b7295ad4b641f4b

      SHA256

      9db09a155ed511005351c118371aafd48b8351867e8c52d2a96e0cff18b0a448

      SHA512

      211bceb3d442025e4af57d3856673858552626de151d86ab28ce80c716ab45413fef1e0d9c3107edb3d290e2c7a157c8e2d5779d9cd2bffc915656919c0fa06b

    • C:\Users\Admin\AppData\Local\Temp\dTnHC.docm

      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\dTnHC.docm

      MD5

      5505377ecfca6bac918422a652e7e3f3

      SHA1

      6bf2ff2d08bcc625d1e245f663e4edd2b1d8fbc4

      SHA256

      dd2f382fdb897d49307d53d9093fad6cc19798bed3f7f3d49b05f613ca3e9d6c

      SHA512

      1dea065da3a2fb07febdf520c43871697b449d677259425cc4b77c3ae97be4dd45857e359cf042e126786c6a593537230f2f3f01710aadbe5cfc2269db2d0563

    • C:\Users\Admin\AppData\Local\Temp\tG99X.docm

      MD5

      9496073ea504163f93ecae5cf9eda5ab

      SHA1

      e1dd890e3390488407ea07bae6043d6079bdeb04

      SHA256

      633276e7f7cfc871ff77c2bb8249382f3933f81f7361b799205f59e569a34959

      SHA512

      f3c0fd17305a65c59fedcff86906ab82ecd215f54e7d2c0887f0f81ffbb334502ce00403b9aac8ee24c7484cd06d65c25acdf03f2615312f9713ae254ffa3be9

    • C:\Users\Admin\AppData\Local\Temp\tpVEU.xlsm

      MD5

      c404236d92d10da59fe3ad6e4faa1cd1

      SHA1

      fe00cec66d8ee3c3f7e0b0b61a5d7c07c1592a3d

      SHA256

      831bc256168bf603876dd10f8597dcdce47dc0bb8e0f1efe33237906d4bbf014

      SHA512

      e17ff2a731b14c19b1c49608064f4e3bfaf9f0bec77ba5423516bab9c624d343dd78d3467599af9677f083b707ba7835569ccd8d6c99ac235bda805618bf41ea

    • C:\Users\Admin\AppData\Local\Temp\tpVEU.xlsm

      MD5

      a9fdc9a36bdb93e518ec59ee54d42e2e

      SHA1

      aa522a435e5be442187a32bee5f2177dda2fdcc3

      SHA256

      2a0124654437b5b6503d6270406f46eacb47ce9737043c09075a308408a5c97a

      SHA512

      79f1e8882446ada8a67529b158baf982dff2b0564b27c2eb92823b87841c2186f852c76b2014b9a01eb3fdcaf873b9487aa4130a9eed6b9eeee4cd01b0a266b8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      MD5

      961d59cc6155043519c710df258ab5a0

      SHA1

      6fe4b49ec0814cd37c27a1b05bfeecdb95ebecd1

      SHA256

      06ad2ffdcf09a742b88ec17f57228c3046b38e8b423b6bb9a7dd83d14774ba41

      SHA512

      8474c01eeb2f38de871e3c3cd77d71861d0e91ed37639936b61a5892ee40486829a1564b17deb95575793b78d0db8996f5c2d771e064e2c8dac4d9eead881a8b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      MD5

      8bd9fa2e1a316d1f82996bc0f17cd932

      SHA1

      a516b5ddb47074a77b3c6b94b8bb8438e734c7f3

      SHA256

      3fc2ae74ce8912b3bc515fc954f831a6bbcaeca98961dec5c4bee9ac5009f350

      SHA512

      fb41e22e53d6a834da07e02149026bea3da7bb393d0a444f8d4abb5f312d32d576639084c9d764be27d9d2c5b50f22e56f830d6a5ba47c3f4085b638b3c6c5f7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      MD5

      9646433f87f3bf663466139275bc17dc

      SHA1

      be47cdb600bb83f71ea35e2ebdd3cf82769c6dc8

      SHA256

      8e0c2cbf53c295cbd53c0364e10643588a39b8679cc3593b50db4dfb34ae1dd5

      SHA512

      c799bd78aabb6b6697d6415d4d63cc25b0f6940020f9b948b5e504949a28539222eb683157e1995b4336b2e504f3b2908180fa082c8a8829308b34a04538176b

    • \Program Files (x86)\Google Chrome Helper\update.dll

      MD5

      aaec25e4932912e9327696fcf44a513e

      SHA1

      51b5bb58cf195cc7fa781d53a4883c948c339d41

      SHA256

      f8023d85a9923810247feb245a0257bee3aa507f316bcca443bb4411637713b1

      SHA512

      45bbf35159f52a3db029cfab8e742b194194d066dd33a3f159004e248eabacc5c3720e6c2f37e4a4d3e58af7142162d02af579412f009de8b9e0c49a377c8754

    • \Program Files (x86)\Google Chrome Helper\update.dll

      MD5

      aaec25e4932912e9327696fcf44a513e

      SHA1

      51b5bb58cf195cc7fa781d53a4883c948c339d41

      SHA256

      f8023d85a9923810247feb245a0257bee3aa507f316bcca443bb4411637713b1

      SHA512

      45bbf35159f52a3db029cfab8e742b194194d066dd33a3f159004e248eabacc5c3720e6c2f37e4a4d3e58af7142162d02af579412f009de8b9e0c49a377c8754

    • memory/1116-122-0x0000000000000000-mapping.dmp

    • memory/1852-121-0x0000000000000000-mapping.dmp

    • memory/2124-126-0x00007FFBF09B0000-0x00007FFBF09C0000-memory.dmp

      Filesize

      64KB

    • memory/2124-133-0x00007FFC09790000-0x00007FFC0B685000-memory.dmp

      Filesize

      31.0MB

    • memory/2124-125-0x00007FFBF09B0000-0x00007FFBF09C0000-memory.dmp

      Filesize

      64KB

    • memory/2124-124-0x00007FFBF09B0000-0x00007FFBF09C0000-memory.dmp

      Filesize

      64KB

    • memory/2124-127-0x00007FFBF09B0000-0x00007FFBF09C0000-memory.dmp

      Filesize

      64KB

    • memory/2124-129-0x00007FFBF09B0000-0x00007FFBF09C0000-memory.dmp

      Filesize

      64KB

    • memory/2124-128-0x00007FFC11BE0000-0x00007FFC14703000-memory.dmp

      Filesize

      43.1MB

    • memory/2124-132-0x00007FFC0B690000-0x00007FFC0C77E000-memory.dmp

      Filesize

      16.9MB

    • memory/3276-119-0x0000000000000000-mapping.dmp

    • memory/3736-118-0x00000000004E0000-0x000000000062A000-memory.dmp

      Filesize

      1.3MB

    • memory/3736-115-0x0000000000000000-mapping.dmp

    • memory/3896-114-0x00000000023F0000-0x00000000023F1000-memory.dmp

      Filesize

      4KB

    • memory/3924-120-0x0000000000000000-mapping.dmp