Analysis

  • max time kernel
    123s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    13-05-2021 12:55

General

  • Target

    033f7c5026b14321459c602761b3895de0631218d63e1104e7a8f891c6d8f32c.exe

  • Size

    849KB

  • MD5

    dd7ef9a28e6c7710a15e0237d56f503f

  • SHA1

    25886a0775680d668f9b3aa38bf0419d3c318100

  • SHA256

    033f7c5026b14321459c602761b3895de0631218d63e1104e7a8f891c6d8f32c

  • SHA512

    712b7159ef442a499b79b08d480f2c15d1eea75cbdc155af2d7ecfc03c502f6cb18cd00db85d48c395e24606027f38f6966b02a5221be28cb9a47ad3f249712f

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\033f7c5026b14321459c602761b3895de0631218d63e1104e7a8f891c6d8f32c.exe
    "C:\Users\Admin\AppData\Local\Temp\033f7c5026b14321459c602761b3895de0631218d63e1104e7a8f891c6d8f32c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\033f7c5026b14321459c602761b3895de0631218d63e1104e7a8f891c6d8f32c.exe.doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1572

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\033f7c5026b14321459c602761b3895de0631218d63e1104e7a8f891c6d8f32c.exe.doc
      MD5

      13fa837b598154256b7aca4168752ce6

      SHA1

      8f087f230e28fa88101d0d5bd2c0c84c094a485b

      SHA256

      3f91f495051aed0eaf8a03039c824d41a0760f112e944868b24ba7df62c1d581

      SHA512

      b4358e576b998b0abdef4aaf696d25b2c53d7212d7c32315eca6dfdd58c8615020b9569a954cf9ac0581395932e2f20efdeba2eebd4bcaef6c447ad1268817b8

    • memory/1572-67-0x0000000000000000-mapping.dmp
    • memory/1572-68-0x000007FEFC471000-0x000007FEFC473000-memory.dmp
      Filesize

      8KB

    • memory/1864-60-0x0000000076A81000-0x0000000076A83000-memory.dmp
      Filesize

      8KB

    • memory/1864-61-0x00000000001B0000-0x00000000001B1000-memory.dmp
      Filesize

      4KB

    • memory/1984-62-0x0000000000000000-mapping.dmp
    • memory/1984-63-0x0000000072F71000-0x0000000072F74000-memory.dmp
      Filesize

      12KB

    • memory/1984-64-0x00000000709F1000-0x00000000709F3000-memory.dmp
      Filesize

      8KB

    • memory/1984-65-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1984-69-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB