Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
16-07-2021 23:03
Static task
static1
Behavioral task
behavioral1
Sample
E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe
Resource
win7v20210408
General
-
Target
E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe
-
Size
1.3MB
-
MD5
4bda3f8d0cb36b33244afdb071a20860
-
SHA1
4e66cd9634c417989b6ccd968c310791f0f64e62
-
SHA256
e16df177681e356ab8a9491e841fa1a757bc40069e2f42493b9238f0584cb9f1
-
SHA512
a21c70a5c6385f04f0332a548727b375fcc244e570c3e8abc20794acf3115b1c689d812c7c8bf72875003dec1797efb3e877c6af821d0d52bd561f99e481b089
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
othvidtiraw.exepid process 3972 othvidtiraw.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\~.sonam kaur.doc office_xlm_macros -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
Processes:
E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1940 WINWORD.EXE 1940 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
othvidtiraw.exedescription pid process Token: SeDebugPrivilege 3972 othvidtiraw.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
WINWORD.EXEpid process 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE 1940 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exedescription pid process target process PID 3772 wrote to memory of 1940 3772 E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe WINWORD.EXE PID 3772 wrote to memory of 1940 3772 E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe WINWORD.EXE PID 3772 wrote to memory of 3972 3772 E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe othvidtiraw.exe PID 3772 wrote to memory of 3972 3772 E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe othvidtiraw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe"C:\Users\Admin\AppData\Local\Temp\E16DF177681E356AB8A9491E841FA1A757BC40069E2F4.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\~.sonam kaur.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\ProgramData\HPathvwra\othvidtiraw.exe"C:\ProgramData\HPathvwra\othvidtiraw.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\HPathvwra\othvidtiraw.exeMD5
9d1bafca6df85aa3cab5846ab1408984
SHA1c25531693b7b45b0a9fadf6c81738b4afd8c28c4
SHA256012eba6182006cf9772ff509896fc2a929b5fe3062f29ed70c451c8ebd393d27
SHA512c51273671b857e3df84f0ceaf4628110f918ed84937a0973e9aa5aa3dcbef8aacd729d5587f2c981a8c5d35d601f172e1cb609425ef97bbed35b26d2d9380b41
-
C:\ProgramData\HPathvwra\othvidtiraw.exeMD5
9d1bafca6df85aa3cab5846ab1408984
SHA1c25531693b7b45b0a9fadf6c81738b4afd8c28c4
SHA256012eba6182006cf9772ff509896fc2a929b5fe3062f29ed70c451c8ebd393d27
SHA512c51273671b857e3df84f0ceaf4628110f918ed84937a0973e9aa5aa3dcbef8aacd729d5587f2c981a8c5d35d601f172e1cb609425ef97bbed35b26d2d9380b41
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\~.sonam kaur.docMD5
0e27d177b82ca30ea3b1b2c11f6cf30f
SHA1f37cf48a0d50303026b38a1c46eb4df02cc01d53
SHA2560f72243366c4f2bb44abad8e2b3dae07c274fb68812860cdcb33bb47bbf61c2c
SHA5127d2c91730d64f4d96e446d56fb2c6060a80217e37c79241276e28da6ddda79a6c124c3e45fc3564a38a72f78820f27e7015ce5150a0ef7fba7d26e7839765483
-
memory/1940-127-0x00007FF9CC500000-0x00007FF9CE3F5000-memory.dmpFilesize
31.0MB
-
memory/1940-118-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmpFilesize
64KB
-
memory/1940-120-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmpFilesize
64KB
-
memory/1940-121-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmpFilesize
64KB
-
memory/1940-123-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmpFilesize
64KB
-
memory/1940-122-0x00007FF9D1500000-0x00007FF9D4023000-memory.dmpFilesize
43.1MB
-
memory/1940-126-0x00007FF9CE400000-0x00007FF9CF4EE000-memory.dmpFilesize
16.9MB
-
memory/1940-387-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmpFilesize
64KB
-
memory/1940-388-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmpFilesize
64KB
-
memory/1940-119-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmpFilesize
64KB
-
memory/1940-117-0x0000000000000000-mapping.dmp
-
memory/1940-386-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmpFilesize
64KB
-
memory/1940-385-0x00007FF9B87B0000-0x00007FF9B87C0000-memory.dmpFilesize
64KB
-
memory/3772-116-0x00000230EB110000-0x00000230EB112000-memory.dmpFilesize
8KB
-
memory/3772-114-0x00000230E8A10000-0x00000230E8A11000-memory.dmpFilesize
4KB
-
memory/3972-141-0x0000021FCD140000-0x0000021FCD142000-memory.dmpFilesize
8KB
-
memory/3972-131-0x0000021FCC3E0000-0x0000021FCC3E1000-memory.dmpFilesize
4KB
-
memory/3972-128-0x0000000000000000-mapping.dmp