Analysis

  • max time kernel
    106s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 11:55

General

  • Target

    9661c41f89e0f4a7da6a9a417b641690243a3954ce08d5e49319cea5571a21f2.exe

  • Size

    227KB

  • MD5

    e9e605d16d67e6857d2f94d95ca779d6

  • SHA1

    8bdf547f1f340e9049e3c318df723ae8102ada4e

  • SHA256

    9661c41f89e0f4a7da6a9a417b641690243a3954ce08d5e49319cea5571a21f2

  • SHA512

    191295cbee7398ff11f951e9fce7cba766f7a44428f465f6571429164560d925dbc824ef70eeacdb045a8929ca77d6d14a23e9af9bdcfa46b3582ae9b30f752a

  • SSDEEP

    1536:iHUsI5mtti54iKEFXvxKqHsNFeCc2SV1inhxvDJ5BsPWBHz5sIfAyW:GEoti5/XeymLcXin/vhB5Zo1

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9661c41f89e0f4a7da6a9a417b641690243a3954ce08d5e49319cea5571a21f2.exe
    "C:\Users\Admin\AppData\Local\Temp\9661c41f89e0f4a7da6a9a417b641690243a3954ce08d5e49319cea5571a21f2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SAC ORGANISATION CHARTexe.doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:632
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:836
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          3⤵
            PID:1204
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\9661c41f89e0f4a7da6a9a417b641690243a3954ce08d5e49319cea5571a21f2.exe" >> nul
          2⤵
          • Deletes itself
          PID:1060

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\SAC ORGANISATION CHARTexe.doc

        Filesize

        152KB

        MD5

        c8419c86c60198df5fe77bc564c18425

        SHA1

        a0f19d00368462fd54e1a0d3c37fb00b8dcad160

        SHA256

        7746ee51d4a0f5354c652d8d54eabc8f3ebd7470bd817ce193be7fa552bff016

        SHA512

        6a5e18fc8283ebf6f873013ed6e7da51315b30c31ea119ec0a3a7b839949e4498769b191378199220a863e62bfc20123eecc595292ca9594c94a25e526cdb082

      • C:\Users\Admin\AppData\Local\Temp\svchost.exe

        Filesize

        6KB

        MD5

        7e3092c3db20d01b489d2586305eac79

        SHA1

        cef2c8f8af7b88227c80d0cc3d579758e549f3e8

        SHA256

        6be7e580f773b9e245104d65f183ddd7c8d66202df52ba113f0c17dd85415965

        SHA512

        059a5f9fbb7ce6d03d08176a6a4fc8e329c013503a3840cf2fdfeb0ef869fbbb9847bb1b8145ad9db61a11dc9ebd868e287f19dc1eef1b466d48d98e8436f6a3

      • C:\Users\Admin\AppData\Local\Temp\svchost.exe

        Filesize

        6KB

        MD5

        7e3092c3db20d01b489d2586305eac79

        SHA1

        cef2c8f8af7b88227c80d0cc3d579758e549f3e8

        SHA256

        6be7e580f773b9e245104d65f183ddd7c8d66202df52ba113f0c17dd85415965

        SHA512

        059a5f9fbb7ce6d03d08176a6a4fc8e329c013503a3840cf2fdfeb0ef869fbbb9847bb1b8145ad9db61a11dc9ebd868e287f19dc1eef1b466d48d98e8436f6a3

      • \Users\Admin\AppData\Local\Temp\svchost.exe

        Filesize

        6KB

        MD5

        7e3092c3db20d01b489d2586305eac79

        SHA1

        cef2c8f8af7b88227c80d0cc3d579758e549f3e8

        SHA256

        6be7e580f773b9e245104d65f183ddd7c8d66202df52ba113f0c17dd85415965

        SHA512

        059a5f9fbb7ce6d03d08176a6a4fc8e329c013503a3840cf2fdfeb0ef869fbbb9847bb1b8145ad9db61a11dc9ebd868e287f19dc1eef1b466d48d98e8436f6a3

      • \Users\Admin\AppData\Local\Temp\svchost.exe

        Filesize

        6KB

        MD5

        7e3092c3db20d01b489d2586305eac79

        SHA1

        cef2c8f8af7b88227c80d0cc3d579758e549f3e8

        SHA256

        6be7e580f773b9e245104d65f183ddd7c8d66202df52ba113f0c17dd85415965

        SHA512

        059a5f9fbb7ce6d03d08176a6a4fc8e329c013503a3840cf2fdfeb0ef869fbbb9847bb1b8145ad9db61a11dc9ebd868e287f19dc1eef1b466d48d98e8436f6a3

      • memory/632-71-0x000007FEFBEE1000-0x000007FEFBEE3000-memory.dmp

        Filesize

        8KB

      • memory/632-70-0x0000000000000000-mapping.dmp

      • memory/836-67-0x0000000000400000-0x0000000000405000-memory.dmp

        Filesize

        20KB

      • memory/836-64-0x0000000000000000-mapping.dmp

      • memory/836-72-0x0000000000400000-0x0000000000405000-memory.dmp

        Filesize

        20KB

      • memory/1060-66-0x0000000000000000-mapping.dmp

      • memory/1900-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

        Filesize

        8KB

      • memory/2012-61-0x000000007143D000-0x0000000071448000-memory.dmp

        Filesize

        44KB

      • memory/2012-58-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2012-68-0x000000007143D000-0x0000000071448000-memory.dmp

        Filesize

        44KB

      • memory/2012-57-0x0000000070451000-0x0000000070453000-memory.dmp

        Filesize

        8KB

      • memory/2012-56-0x00000000729D1000-0x00000000729D4000-memory.dmp

        Filesize

        12KB

      • memory/2012-55-0x0000000000000000-mapping.dmp

      • memory/2012-73-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB