Analysis

  • max time kernel
    118s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2023, 03:26

General

  • Target

    Microsoft Office 2019 + Licencia/Office/OInstall.exe

  • Size

    9.5MB

  • MD5

    f71556138c9eb716330063156db4a6bc

  • SHA1

    bd91945d407cbeee830c15280c8324459f0ff61a

  • SHA256

    41ff83c380b958e918c4061c02a6077590d7630a01d7f2f0f448dc1a6fbf284a

  • SHA512

    259642e8b2398122f00b031f6af4e79a2cea0831b4ef00c0f118f1fd28d32c92122a118921ce2af915f141273a2774ccf9abdfdc596175ac3c190e8f891c139e

  • SSDEEP

    196608:vp1crEM65aqMLvUcm+oz3BkeBTAUW24t13Dr7m0mitn2xe7gXQZ+3jeRBTfYNCH1:hurEzabjm+4keB0vt1Dr7m0mc2xe7gAN

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Microsoft Office 2019 + Licencia\Office\OInstall.exe
    "C:\Users\Admin\AppData\Local\Temp\Microsoft Office 2019 + Licencia\Office\OInstall.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Windows\system32\cmd.exe
      "C:\Windows\Sysnative\cmd.exe" /D /c copy C:\Windows\system32\Tasks\OInstall "C:\Windows\Temp\OInstall.tmp" /Y
      2⤵
        PID:1520
      • C:\Windows\system32\cmd.exe
        "C:\Windows\Sysnative\cmd.exe" /D /c C:\Users\Admin\AppData\Local\Temp\MICROS~1\Office\files\Setup.exe /configure Configure.xml
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1340
        • C:\Users\Admin\AppData\Local\Temp\MICROS~1\Office\files\setup.exe
          C:\Users\Admin\AppData\Local\Temp\MICROS~1\Office\files\Setup.exe /configure Configure.xml
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Modifies system certificate store
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of SetWindowsHookEx
          PID:1428
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x58c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1528

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MICROS~1\Office\files\Configure.xml

      Filesize

      542B

      MD5

      29fb6963f0eeb4afd22d9790e455224d

      SHA1

      320006caf740821af9ce9f6a05bdf218a4e91e26

      SHA256

      70067e1c0a1e07c7d3c62ad43693a589226ebb3e089951b203811c1b6f593a9f

      SHA512

      d1348b2eae945aa0d0508dc5dbe9e65bf5f8a65d22e5040c879321c696ccf3f089e37421fd1114d997aebda33e46c33fed70f969f6ef5d8f2c5edefd0e0f26bd

    • C:\Users\Admin\AppData\Local\Temp\MICROS~1\Office\files\setup.exe

      Filesize

      4.8MB

      MD5

      d4a7c7c3c92c4e9bc9bdee1c660e60db

      SHA1

      505c2d09923f957f6894f15fa2fd13615de6f4d1

      SHA256

      b95ac36a49e79c3e63e23eca86eac3d22acd80363d0f0aa83ba7ee7799acf2a5

      SHA512

      50fef647df8a13bc25b2cf5fab995664404953e3385ae0eafea6939c1587743014c0a1d277bc5b4cbad2a56bde92a3854f51cd1dcf7de710f219d15ebe141fbb

    • C:\Users\Admin\AppData\Local\Temp\MICROS~1\Office\files\setup.exe

      Filesize

      4.8MB

      MD5

      d4a7c7c3c92c4e9bc9bdee1c660e60db

      SHA1

      505c2d09923f957f6894f15fa2fd13615de6f4d1

      SHA256

      b95ac36a49e79c3e63e23eca86eac3d22acd80363d0f0aa83ba7ee7799acf2a5

      SHA512

      50fef647df8a13bc25b2cf5fab995664404953e3385ae0eafea6939c1587743014c0a1d277bc5b4cbad2a56bde92a3854f51cd1dcf7de710f219d15ebe141fbb

    • memory/1216-54-0x0000000075C81000-0x0000000075C83000-memory.dmp

      Filesize

      8KB

    • memory/1216-55-0x0000000000400000-0x00000000015B4000-memory.dmp

      Filesize

      17.7MB

    • memory/1216-57-0x0000000000400000-0x00000000015B4000-memory.dmp

      Filesize

      17.7MB