Analysis

  • max time kernel
    138s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    16-07-2021 23:03

General

  • Target

    E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe

  • Size

    1.3MB

  • MD5

    4bda3f8d0cb36b33244afdb071a20860

  • SHA1

    4e66cd9634c417989b6ccd968c310791f0f64e62

  • SHA256

    e16df177681e356ab8a9491e841fa1a757bc40069e2f42493b9238f0584cb9f1

  • SHA512

    a21c70a5c6385f04f0332a548727b375fcc244e570c3e8abc20794acf3115b1c689d812c7c8bf72875003dec1797efb3e877c6af821d0d52bd561f99e481b089

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe
    "C:\Users\Admin\AppData\Local\Temp\E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\~.sonam kaur.doc" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1940
    • C:\ProgramData\HPathvwra\othvidtiraw.exe
      "C:\ProgramData\HPathvwra\othvidtiraw.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3972

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\HPathvwra\othvidtiraw.exe
    MD5

    9d1bafca6df85aa3cab5846ab1408984

    SHA1

    c25531693b7b45b0a9fadf6c81738b4afd8c28c4

    SHA256

    012eba6182006cf9772ff509896fc2a929b5fe3062f29ed70c451c8ebd393d27

    SHA512

    c51273671b857e3df84f0ceaf4628110f918ed84937a0973e9aa5aa3dcbef8aacd729d5587f2c981a8c5d35d601f172e1cb609425ef97bbed35b26d2d9380b41

  • C:\ProgramData\HPathvwra\othvidtiraw.exe
    MD5

    9d1bafca6df85aa3cab5846ab1408984

    SHA1

    c25531693b7b45b0a9fadf6c81738b4afd8c28c4

    SHA256

    012eba6182006cf9772ff509896fc2a929b5fe3062f29ed70c451c8ebd393d27

    SHA512

    c51273671b857e3df84f0ceaf4628110f918ed84937a0973e9aa5aa3dcbef8aacd729d5587f2c981a8c5d35d601f172e1cb609425ef97bbed35b26d2d9380b41

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\~.sonam kaur.doc
    MD5

    0e27d177b82ca30ea3b1b2c11f6cf30f

    SHA1

    f37cf48a0d50303026b38a1c46eb4df02cc01d53

    SHA256

    0f72243366c4f2bb44abad8e2b3dae07c274fb68812860cdcb33bb47bbf61c2c

    SHA512

    7d2c91730d64f4d96e446d56fb2c6060a80217e37c79241276e28da6ddda79a6c124c3e45fc3564a38a72f78820f27e7015ce5150a0ef7fba7d26e7839765483

  • memory/1940-127-0x00007FF9CC500000-0x00007FF9CE3F5000-memory.dmp
    Filesize

    31.0MB

  • memory/1940-118-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmp
    Filesize

    64KB

  • memory/1940-120-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmp
    Filesize

    64KB

  • memory/1940-121-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmp
    Filesize

    64KB

  • memory/1940-123-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmp
    Filesize

    64KB

  • memory/1940-122-0x00007FF9D1500000-0x00007FF9D4023000-memory.dmp
    Filesize

    43.1MB

  • memory/1940-126-0x00007FF9CE400000-0x00007FF9CF4EE000-memory.dmp
    Filesize

    16.9MB

  • memory/1940-387-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmp
    Filesize

    64KB

  • memory/1940-388-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmp
    Filesize

    64KB

  • memory/1940-119-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmp
    Filesize

    64KB

  • memory/1940-117-0x0000000000000000-mapping.dmp
  • memory/1940-386-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmp
    Filesize

    64KB

  • memory/1940-385-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmp
    Filesize

    64KB

  • memory/3772-116-0x00000230EB110000-0x00000230EB112000-memory.dmp
    Filesize

    8KB

  • memory/3772-114-0x00000230E8A10000-0x00000230E8A11000-memory.dmp
    Filesize

    4KB

  • memory/3972-141-0x0000021FCD140000-0x0000021FCD142000-memory.dmp
    Filesize

    8KB

  • memory/3972-131-0x0000021FCC3E0000-0x0000021FCC3E1000-memory.dmp
    Filesize

    4KB

  • memory/3972-128-0x0000000000000000-mapping.dmp