Analysis

  • max time kernel
    114s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 17:17

General

  • Target

    e8be07c4d18b04dd32e96a71353dea55175c4d567025239a984ec5fb0c7ce8d9.exe

  • Size

    132KB

  • MD5

    368deb8b5eb087a2c166c9f67bb625e7

  • SHA1

    f1226f6117eeba15bd581a88da990d48271b5f94

  • SHA256

    e8be07c4d18b04dd32e96a71353dea55175c4d567025239a984ec5fb0c7ce8d9

  • SHA512

    db111da71ea9996aebedb53f9b5e68397e3fd0aba168d95db13b6768ef424e8caa2bb2237ca328ffd40d831791c2fb96117a6ff13e20832b5dceb8c630097e93

  • SSDEEP

    3072:6mi+/dgy5Ef8doutaZZYCajVJ4gnszXtUJqdZHvYf0X:6tSEf+oSaR6PH+tU+wfY

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 10 IoCs
  • Drops file in System32 directory 17 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8be07c4d18b04dd32e96a71353dea55175c4d567025239a984ec5fb0c7ce8d9.exe
    "C:\Users\Admin\AppData\Local\Temp\e8be07c4d18b04dd32e96a71353dea55175c4d567025239a984ec5fb0c7ce8d9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:696
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\Temp\_$Cf\e8be07c4d18b04dd32e96a71353dea55175c4d567025239a984ec5fb0c7ce8d9 .doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1288
      • C:\Windows\Temp\_$Cf\osk.exe
        "C:\Windows\Temp\_$Cf\osk.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Windows\SysWOW64\WINWORD.EXE
          "C:\Windows\system32\WINWORD.EXE"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:908
          • C:\Windows\SysWOW64\WINWORD.EXE
            "C:\Windows\system32\WINWORD.EXE"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1496
            • C:\Windows\SysWOW64\WINWORD.EXE
              "C:\Windows\system32\WINWORD.EXE"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1020
              • C:\Windows\SysWOW64\WINWORD.EXE
                "C:\Windows\system32\WINWORD.EXE"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1292

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Com\ctfmoon.exe

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • C:\Windows\SysWOW64\Com\ctfmoon.exe

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • C:\Windows\SysWOW64\Com\ctfmoon.exe

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • C:\Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • C:\Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • C:\Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • C:\Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • C:\Windows\SysWOW64\WINWORD.exe

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • C:\Windows\Temp\_$Cf\e8be07c4d18b04dd32e96a71353dea55175c4d567025239a984ec5fb0c7ce8d9 .doc

            Filesize

            105KB

            MD5

            bb6f88e2b44eec5b3cf6a19a3b5f1fb4

            SHA1

            2bf2731ab6381f79ae4e9799912ba00474b37862

            SHA256

            f4a12c9909a21919f28536cabc12df8a51748c8cd29805574362e2ceee8b2665

            SHA512

            9da908c6b4076fcca436bb0250b911c0f7a9c5d8f91551767528def589ac4629b9988a854b680df65351f7814fd4525a33a2ba26f6ae3dc2195b0255d1fa2665

          • C:\Windows\Temp\_$Cf\osk.exe

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • C:\Windows\Temp\_$Cf\osk.exe

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • \Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • \Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • \Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • \Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • \Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • \Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • \Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • \Windows\SysWOW64\WINWORD.EXE

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • \Windows\Temp\_$Cf\osk.exe

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • \Windows\Temp\_$Cf\osk.exe

            Filesize

            74KB

            MD5

            862a96836fe55f230039047fc1897b6f

            SHA1

            56a56c039d90714cefe7d2e7bb02e13c2b04764c

            SHA256

            0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

            SHA512

            d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

          • memory/696-57-0x00000000764D1000-0x00000000764D3000-memory.dmp

            Filesize

            8KB

          • memory/696-56-0x0000000011000000-0x000000001102F000-memory.dmp

            Filesize

            188KB

          • memory/696-63-0x0000000011000000-0x000000001102F000-memory.dmp

            Filesize

            188KB

          • memory/908-87-0x0000000011000000-0x000000001102F000-memory.dmp

            Filesize

            188KB

          • memory/1020-108-0x0000000011000000-0x000000001102F000-memory.dmp

            Filesize

            188KB

          • memory/1020-102-0x0000000011000000-0x000000001102F000-memory.dmp

            Filesize

            188KB

          • memory/1288-115-0x000007FEFBE41000-0x000007FEFBE43000-memory.dmp

            Filesize

            8KB

          • memory/1292-111-0x0000000011000000-0x000000001102F000-memory.dmp

            Filesize

            188KB

          • memory/1360-69-0x0000000072791000-0x0000000072794000-memory.dmp

            Filesize

            12KB

          • memory/1360-82-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1360-117-0x00000000711FD000-0x0000000071208000-memory.dmp

            Filesize

            44KB

          • memory/1360-116-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1360-74-0x0000000070211000-0x0000000070213000-memory.dmp

            Filesize

            8KB

          • memory/1360-113-0x00000000711FD000-0x0000000071208000-memory.dmp

            Filesize

            44KB

          • memory/1360-103-0x00000000711FD000-0x0000000071208000-memory.dmp

            Filesize

            44KB

          • memory/1496-97-0x0000000011000000-0x000000001102F000-memory.dmp

            Filesize

            188KB

          • memory/1548-112-0x0000000002700000-0x000000000272F000-memory.dmp

            Filesize

            188KB

          • memory/1548-75-0x0000000011000000-0x000000001102F000-memory.dmp

            Filesize

            188KB

          • memory/1548-73-0x0000000002700000-0x000000000272F000-memory.dmp

            Filesize

            188KB