Analysis

  • max time kernel
    100s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 23:53

General

  • Target

    b713a80b500f4371a0b482f16b6fd7a827f6de1b2ac0a89d7e0785d5756c7f93.exe

  • Size

    129KB

  • MD5

    3069bcf9d7a15667e4b713b446b8fa91

  • SHA1

    a4ea992438e270f99671bdfff994e5f666c2ff2e

  • SHA256

    b713a80b500f4371a0b482f16b6fd7a827f6de1b2ac0a89d7e0785d5756c7f93

  • SHA512

    d4a0aaaa4fef789570841eb35f06a3f4621ef1c449934942eef6c614c71ac3affdeb9c8305cd15ca159f3553883d3136fe9f5ece8785def2fa60098dfc557f18

  • SSDEEP

    1536:Nmznh+iLD/pfXVg8prKYlVv9EGEPgMV4Nn1w/J2Vq+WVUKfWNv3vtmgMbFu1ZltK:sh+iLdDeYbePVhB2M+Wc3Ag0Fu1ZvK

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b713a80b500f4371a0b482f16b6fd7a827f6de1b2ac0a89d7e0785d5756c7f93.exe
    "C:\Users\Admin\AppData\Local\Temp\b713a80b500f4371a0b482f16b6fd7a827f6de1b2ac0a89d7e0785d5756c7f93.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b713a80b500f4371a0b482f16b6fd7a827f6de1b2ac0a89d7e0785d5756c7f93.doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1332
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1660

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\b713a80b500f4371a0b482f16b6fd7a827f6de1b2ac0a89d7e0785d5756c7f93.doc

      Filesize

      2KB

      MD5

      6ebd682ef9cbf91a1cbf2fc27b62b5ff

      SHA1

      554321ef26306f0abf5b3e77010bccd01159c8f3

      SHA256

      fadb33136ef03648dd825059fc087a1a9d30f93c03898a0dfa0136611f4d52b7

      SHA512

      21437329954cf26099f7b44b92fcf1f82b47c026e3f8a264d945ecd1f1833d8e905e9e797a2c127e17c494f74f3ec6ed646aac07bd2ba885a026b90b30f55cb2

    • memory/1324-59-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/1324-55-0x0000000002580000-0x0000000002615000-memory.dmp

      Filesize

      596KB

    • memory/1324-54-0x00000000752B1000-0x00000000752B3000-memory.dmp

      Filesize

      8KB

    • memory/1332-60-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1332-58-0x000000006FB51000-0x000000006FB53000-memory.dmp

      Filesize

      8KB

    • memory/1332-57-0x00000000720D1000-0x00000000720D4000-memory.dmp

      Filesize

      12KB

    • memory/1332-63-0x0000000070B3D000-0x0000000070B48000-memory.dmp

      Filesize

      44KB

    • memory/1332-64-0x0000000070B3D000-0x0000000070B48000-memory.dmp

      Filesize

      44KB

    • memory/1332-67-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1332-68-0x0000000070B3D000-0x0000000070B48000-memory.dmp

      Filesize

      44KB

    • memory/1660-66-0x000007FEFB781000-0x000007FEFB783000-memory.dmp

      Filesize

      8KB