Analysis

  • max time kernel
    134s
  • max time network
    183s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    18-05-2021 11:37

General

  • Target

    5999187654ca53d596fa2b82010badf37584474d15b6ed176f14e330a1b9b25e.exe

  • Size

    88KB

  • MD5

    107a2fefad98ccbfe9e90b7d673af869

  • SHA1

    119484ee7a5a361cfb9de2542c044135a4cc33ca

  • SHA256

    5999187654ca53d596fa2b82010badf37584474d15b6ed176f14e330a1b9b25e

  • SHA512

    59c6b106197d8c6a928422806e5dd921f1ac82fd033ccaccf7974e5b13ecebb34d37e4a130a8ab70fcd9730421121c31c23df60765f1ca97286f6f260129b7aa

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 46 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5999187654ca53d596fa2b82010badf37584474d15b6ed176f14e330a1b9b25e.exe
    "C:\Users\Admin\AppData\Local\Temp\5999187654ca53d596fa2b82010badf37584474d15b6ed176f14e330a1b9b25e.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\SUGUZEFHWD.dll"
      2⤵
      • Modifies registry class
      PID:764
    • C:\Users\Admin\AppData\Local\Temp\EnclosureMasonry.exe
      "C:\Users\Admin\AppData\Local\Temp\EnclosureMasonry.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:1712
    • C:\Users\Admin\AppData\Local\Temp\EnclosureMasonry.exe
      C:\Users\Admin\AppData\Local\Temp\EnclosureMasonry.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:1644

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Browser Extensions

1
T1176

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\EnclosureMasonry.exe
    MD5

    619b4cf619eaebe531bb252e99cdd23b

    SHA1

    75131437e0039afc65aca67a7a54885b58b8054e

    SHA256

    cb6686fe656cba89761f291c52a77f9f5d9c50fa20d277d4e2e1bfa122e02402

    SHA512

    40a84a0a5b9246cff882a12e76b1e014fb9b6f018a637402f74bfd24155dd64b7a1ff519907a1e24b64ca1382a191adf6d29499d8f340426cb6876cd2fe3e6d3

  • C:\Users\Admin\AppData\Local\Temp\EnclosureMasonry.exe
    MD5

    619b4cf619eaebe531bb252e99cdd23b

    SHA1

    75131437e0039afc65aca67a7a54885b58b8054e

    SHA256

    cb6686fe656cba89761f291c52a77f9f5d9c50fa20d277d4e2e1bfa122e02402

    SHA512

    40a84a0a5b9246cff882a12e76b1e014fb9b6f018a637402f74bfd24155dd64b7a1ff519907a1e24b64ca1382a191adf6d29499d8f340426cb6876cd2fe3e6d3

  • C:\Windows\SUGUZEFHWD.dll
    MD5

    a3716a7e6a87a2b55dacaf863e3cbc6f

    SHA1

    826f9bf60c15c269c53e64dbf12484c6c199d892

    SHA256

    bb47f9c56664bf852c94ebcfe11da19f590eccae073fa35cb54be6171f2ef09c

    SHA512

    2db1d232eefef751c702d1e8aedea02d6f6729f4c928ec88185ebd2af34bd8d4f574741f05bc7d7582f2ec5ff63a08fd6bea1cfd09f25151f0d662af24055a67

  • \Users\Admin\AppData\Local\Temp\EnclosureMasonry.exe
    MD5

    619b4cf619eaebe531bb252e99cdd23b

    SHA1

    75131437e0039afc65aca67a7a54885b58b8054e

    SHA256

    cb6686fe656cba89761f291c52a77f9f5d9c50fa20d277d4e2e1bfa122e02402

    SHA512

    40a84a0a5b9246cff882a12e76b1e014fb9b6f018a637402f74bfd24155dd64b7a1ff519907a1e24b64ca1382a191adf6d29499d8f340426cb6876cd2fe3e6d3

  • \Users\Admin\AppData\Local\Temp\EnclosureMasonry.exe
    MD5

    619b4cf619eaebe531bb252e99cdd23b

    SHA1

    75131437e0039afc65aca67a7a54885b58b8054e

    SHA256

    cb6686fe656cba89761f291c52a77f9f5d9c50fa20d277d4e2e1bfa122e02402

    SHA512

    40a84a0a5b9246cff882a12e76b1e014fb9b6f018a637402f74bfd24155dd64b7a1ff519907a1e24b64ca1382a191adf6d29499d8f340426cb6876cd2fe3e6d3

  • \Users\Admin\AppData\Local\Temp\EnclosureMasonry.exe
    MD5

    619b4cf619eaebe531bb252e99cdd23b

    SHA1

    75131437e0039afc65aca67a7a54885b58b8054e

    SHA256

    cb6686fe656cba89761f291c52a77f9f5d9c50fa20d277d4e2e1bfa122e02402

    SHA512

    40a84a0a5b9246cff882a12e76b1e014fb9b6f018a637402f74bfd24155dd64b7a1ff519907a1e24b64ca1382a191adf6d29499d8f340426cb6876cd2fe3e6d3

  • \Users\Admin\AppData\Local\Temp\EnclosureMasonry.exe
    MD5

    619b4cf619eaebe531bb252e99cdd23b

    SHA1

    75131437e0039afc65aca67a7a54885b58b8054e

    SHA256

    cb6686fe656cba89761f291c52a77f9f5d9c50fa20d277d4e2e1bfa122e02402

    SHA512

    40a84a0a5b9246cff882a12e76b1e014fb9b6f018a637402f74bfd24155dd64b7a1ff519907a1e24b64ca1382a191adf6d29499d8f340426cb6876cd2fe3e6d3

  • memory/764-61-0x0000000000000000-mapping.dmp
  • memory/1644-70-0x0000000000000000-mapping.dmp
  • memory/1712-66-0x0000000000000000-mapping.dmp
  • memory/1988-60-0x0000000075AD1000-0x0000000075AD3000-memory.dmp
    Filesize

    8KB