Analysis

  • max time kernel
    73s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 04:38

General

  • Target

    21d376f0ec63236e590e58add44c00647588fdeb52b59f34efa43d5219520fb4.exe

  • Size

    616KB

  • MD5

    87e30ba93b9ebff6e00c0a802530e5fe

  • SHA1

    e54d3e6f3f7033b03db038a6ea43192e26c7792e

  • SHA256

    21d376f0ec63236e590e58add44c00647588fdeb52b59f34efa43d5219520fb4

  • SHA512

    5471ca2af9c61913cd5449a9d49d275a4bcdcc042e109a66e077a57a989bdf9e7a153c6c9ba8837d03927e8177d4e66245f290b83f2c3dc92793f66e210c2bef

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21d376f0ec63236e590e58add44c00647588fdeb52b59f34efa43d5219520fb4.exe
    "C:\Users\Admin\AppData\Local\Temp\21d376f0ec63236e590e58add44c00647588fdeb52b59f34efa43d5219520fb4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:388
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1984

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\21d376f0ec63236e590e58add44c00647588fdeb52b59f34efa43d5219520fb4
    Filesize

    200KB

    MD5

    9059d5101c8926d8057efdcf4a5bfb5e

    SHA1

    2d5302a7009175fc7f88286b827fd4c4d273ea0d

    SHA256

    5c9aec61ed164b392d42a7785c95987951f53192ecd5f918bd3bc6b68d50f0b3

    SHA512

    181a8894519b9d22f0c7519820275e2df0456f86da8c932317d2ca390bad9909245c9703aa745ca2a428eabb841beb6b3456eda90acf2a48f810f758c84764f6

  • C:\Users\Admin\AppData\Local\Temp\ftkmte0ck3.dll
    Filesize

    712KB

    MD5

    e8ed63bfb33562af6d9bb62dbaaef5b9

    SHA1

    5dd2b08c4bb43814449d5d0ea9993d4e673a22bf

    SHA256

    aaa9b276ef7b9717ce93f2bdc4f2cafb5b66654d543e5783b6f4d226182ca1a5

    SHA512

    9f8581b67c469d6b6e13ac32277c9f7ffd1b64a3c18c578001058e99cc480361cde8a8ef2b28c96c1e9541be629945f5cc39c5aa051206133ce919aabacabf09

  • \Users\Admin\AppData\Local\Temp\ftkmte0ck3.dll
    Filesize

    712KB

    MD5

    e8ed63bfb33562af6d9bb62dbaaef5b9

    SHA1

    5dd2b08c4bb43814449d5d0ea9993d4e673a22bf

    SHA256

    aaa9b276ef7b9717ce93f2bdc4f2cafb5b66654d543e5783b6f4d226182ca1a5

    SHA512

    9f8581b67c469d6b6e13ac32277c9f7ffd1b64a3c18c578001058e99cc480361cde8a8ef2b28c96c1e9541be629945f5cc39c5aa051206133ce919aabacabf09

  • memory/388-54-0x0000000076C81000-0x0000000076C83000-memory.dmp
    Filesize

    8KB

  • memory/1984-55-0x000000002F211000-0x000000002F214000-memory.dmp
    Filesize

    12KB

  • memory/1984-56-0x0000000071C41000-0x0000000071C43000-memory.dmp
    Filesize

    8KB

  • memory/1984-57-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1984-58-0x0000000072C2D000-0x0000000072C38000-memory.dmp
    Filesize

    44KB

  • memory/1984-62-0x0000000002E90000-0x0000000002E94000-memory.dmp
    Filesize

    16KB

  • memory/1984-65-0x0000000000676000-0x000000000067A000-memory.dmp
    Filesize

    16KB