Analysis

  • max time kernel
    130s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 22:57

General

  • Target

    af36ad4144c12b567bfc17d54195afc8badd4f3efd3728a549908fb0363d44e3.exe

  • Size

    107KB

  • MD5

    5a9ae53e272a648ab06172e0fde91de6

  • SHA1

    39bab3e90b5fede9787178c4e136014f21991553

  • SHA256

    af36ad4144c12b567bfc17d54195afc8badd4f3efd3728a549908fb0363d44e3

  • SHA512

    f2744b1956cf3251c3c30dea5c5a8d9364258c55b1af5105f4793a5228bc6233c1b71c653accaaaf0ba99af89e80de17cfe9fd92e5462c4d4119d6130e5ed872

  • SSDEEP

    3072:6mi+/dgy5Ef8doutaZZYCajVJ4gw6LGa:6tSEf+oSaR6PtZK

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af36ad4144c12b567bfc17d54195afc8badd4f3efd3728a549908fb0363d44e3.exe
    "C:\Users\Admin\AppData\Local\Temp\af36ad4144c12b567bfc17d54195afc8badd4f3efd3728a549908fb0363d44e3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\Temp\_$Cf\af36ad4144c12b567bfc17d54195afc8badd4f3efd3728a549908fb0363d44e3 .doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1324
      • C:\Windows\Temp\_$Cf\osk.exe
        "C:\Windows\Temp\_$Cf\osk.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1108
        • C:\Windows\SysWOW64\WINWORD.EXE
          "C:\Windows\system32\WINWORD.EXE"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1976
          • C:\Windows\SysWOW64\WINWORD.EXE
            "C:\Windows\system32\WINWORD.EXE"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:828

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Com\ctfmoon.exe

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • C:\Windows\SysWOW64\WINWORD.EXE

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • C:\Windows\SysWOW64\WINWORD.EXE

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • C:\Windows\SysWOW64\WINWORD.exe

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • C:\Windows\Temp\_$Cf\af36ad4144c12b567bfc17d54195afc8badd4f3efd3728a549908fb0363d44e3 .doc

      Filesize

      45KB

      MD5

      a169020f1ff628f46d046c6cf2caf235

      SHA1

      e1eb8b1eb0ad172c4ef43284a2f3fa7a2d24c226

      SHA256

      d68074f28ee9d7b3a36653817697237fc598658fc5abf522adb65e182e05f9b1

      SHA512

      63331edff2ede2828cfd0f067291bd30411582c6cb436c7f8d57790d7b9997c0e9c5103294298f9ba736142e876833f3430f292129ddcd746d40343ab54f1584

    • C:\Windows\Temp\_$Cf\osk.exe

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • C:\Windows\Temp\_$Cf\osk.exe

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • \Windows\SysWOW64\WINWORD.EXE

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • \Windows\SysWOW64\WINWORD.EXE

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • \Windows\SysWOW64\WINWORD.EXE

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • \Windows\SysWOW64\WINWORD.EXE

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • \Windows\Temp\_$Cf\osk.exe

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • \Windows\Temp\_$Cf\osk.exe

      Filesize

      74KB

      MD5

      862a96836fe55f230039047fc1897b6f

      SHA1

      56a56c039d90714cefe7d2e7bb02e13c2b04764c

      SHA256

      0044b6448afbf8cce1057d5226b4baf27708656d9245f06dc9408956ced0cb21

      SHA512

      d6e77acb572339746797cfb9fd62b90fbcef4590f47eba5db538e97f7535326266b8146e120983d35a0978298083ffae90714ce119ef9c456b428374d288d574

    • memory/828-89-0x0000000011000000-0x000000001102F000-memory.dmp

      Filesize

      188KB

    • memory/840-76-0x0000000072F11000-0x0000000072F14000-memory.dmp

      Filesize

      12KB

    • memory/840-90-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/840-97-0x000000007197D000-0x0000000071988000-memory.dmp

      Filesize

      44KB

    • memory/840-80-0x0000000070991000-0x0000000070993000-memory.dmp

      Filesize

      8KB

    • memory/840-96-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/840-94-0x000000007197D000-0x0000000071988000-memory.dmp

      Filesize

      44KB

    • memory/840-92-0x000000007197D000-0x0000000071988000-memory.dmp

      Filesize

      44KB

    • memory/1108-73-0x0000000011000000-0x000000001102F000-memory.dmp

      Filesize

      188KB

    • memory/1324-95-0x000007FEFC341000-0x000007FEFC343000-memory.dmp

      Filesize

      8KB

    • memory/1932-57-0x0000000011000000-0x000000001102F000-memory.dmp

      Filesize

      188KB

    • memory/1932-67-0x0000000011000000-0x000000001102F000-memory.dmp

      Filesize

      188KB

    • memory/1932-56-0x0000000076401000-0x0000000076403000-memory.dmp

      Filesize

      8KB

    • memory/1976-86-0x0000000011000000-0x000000001102F000-memory.dmp

      Filesize

      188KB

    • memory/1976-81-0x0000000011000000-0x000000001102F000-memory.dmp

      Filesize

      188KB