Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/08/2023, 23:42

General

  • Target

    user.exe

  • Size

    1.2MB

  • MD5

    4d9fd21aa87a2eb1bcad4d9dff0c6362

  • SHA1

    9074fad1d75cb2612d16b3d6794fe97112cc8a82

  • SHA256

    02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43

  • SHA512

    a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be

  • SSDEEP

    24576:EnsJ39LyjbJkQFMhmC+6GD99bC1kzMc0z3:EnsHyjtk2MYC5GDzuizMcw3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    PID:3044
  • C:\Users\Admin\AppData\Local\Temp\user.exe
    "C:\Users\Admin\AppData\Local\Temp\user.exe"
    1⤵
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Users\Admin\AppData\Local\Temp\._cache_user.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_user.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1480
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4636
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2244
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4152

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Synaptics\Synaptics.exe

          Filesize

          1.2MB

          MD5

          4d9fd21aa87a2eb1bcad4d9dff0c6362

          SHA1

          9074fad1d75cb2612d16b3d6794fe97112cc8a82

          SHA256

          02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43

          SHA512

          a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be

        • C:\ProgramData\Synaptics\Synaptics.exe

          Filesize

          1.2MB

          MD5

          4d9fd21aa87a2eb1bcad4d9dff0c6362

          SHA1

          9074fad1d75cb2612d16b3d6794fe97112cc8a82

          SHA256

          02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43

          SHA512

          a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be

        • C:\ProgramData\Synaptics\Synaptics.exe

          Filesize

          1.2MB

          MD5

          4d9fd21aa87a2eb1bcad4d9dff0c6362

          SHA1

          9074fad1d75cb2612d16b3d6794fe97112cc8a82

          SHA256

          02a7ad63210fdb04980ce442aadbad7c40086c063fc037eb7eddc72f09da7c43

          SHA512

          a07683f97e46749dc2db66874b2daedd7e11fabf76e1a34998c1784fdaa229e1294cff7b12967afc8650af2cf3cbb86d37a9a1e8c254f8cbdc9092f46d4fc5be

        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

          Filesize

          435KB

          MD5

          94a415594e19333d35e93cb877973ad5

          SHA1

          7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

          SHA256

          5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

          SHA512

          32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

          Filesize

          435KB

          MD5

          94a415594e19333d35e93cb877973ad5

          SHA1

          7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

          SHA256

          5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

          SHA512

          32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

        • C:\Users\Admin\AppData\Local\Temp\._cache_user.exe

          Filesize

          435KB

          MD5

          94a415594e19333d35e93cb877973ad5

          SHA1

          7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

          SHA256

          5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

          SHA512

          32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

        • C:\Users\Admin\AppData\Local\Temp\._cache_user.exe

          Filesize

          435KB

          MD5

          94a415594e19333d35e93cb877973ad5

          SHA1

          7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

          SHA256

          5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

          SHA512

          32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

        • C:\Users\Admin\AppData\Local\Temp\._cache_user.exe

          Filesize

          435KB

          MD5

          94a415594e19333d35e93cb877973ad5

          SHA1

          7c09b0932caf621fc90fe269ceabf6b4fd2e55f2

          SHA256

          5e0fb6d1301c00001b3b3158c822ced6173548b0b85953577f6527431d5fc71f

          SHA512

          32d60355bbe3ea1a80ad84e054a07ae4ea9b3c8607dc435744fe1dfdebcc9dca83b6ce954d693fb2791044236c07a71f428f1fee2bf478f112c90bd2889038c3

        • C:\Users\Admin\AppData\Local\Temp\ZAW33OH8.xlsm

          Filesize

          17KB

          MD5

          e566fc53051035e1e6fd0ed1823de0f9

          SHA1

          00bc96c48b98676ecd67e81a6f1d7754e4156044

          SHA256

          8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

          SHA512

          a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

        • memory/1480-199-0x0000000000D70000-0x0000000000E70000-memory.dmp

          Filesize

          1024KB

        • memory/1480-200-0x0000000003990000-0x00000000039BA000-memory.dmp

          Filesize

          168KB

        • memory/1480-202-0x0000000003990000-0x00000000039BA000-memory.dmp

          Filesize

          168KB

        • memory/1480-227-0x0000000003990000-0x00000000039BA000-memory.dmp

          Filesize

          168KB

        • memory/1480-226-0x0000000000D70000-0x0000000000E70000-memory.dmp

          Filesize

          1024KB

        • memory/2144-1-0x00000000022C0000-0x00000000022C1000-memory.dmp

          Filesize

          4KB

        • memory/2144-135-0x0000000000400000-0x000000000052F000-memory.dmp

          Filesize

          1.2MB

        • memory/2244-238-0x0000000002730000-0x000000000275A000-memory.dmp

          Filesize

          168KB

        • memory/2244-220-0x0000000002730000-0x000000000275A000-memory.dmp

          Filesize

          168KB

        • memory/2244-219-0x0000000000A50000-0x0000000000B50000-memory.dmp

          Filesize

          1024KB

        • memory/4152-209-0x00007FFA21650000-0x00007FFA21660000-memory.dmp

          Filesize

          64KB

        • memory/4152-235-0x00007FFA615D0000-0x00007FFA617C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4152-210-0x00007FFA615D0000-0x00007FFA617C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4152-212-0x00007FFA615D0000-0x00007FFA617C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4152-211-0x00007FFA21650000-0x00007FFA21660000-memory.dmp

          Filesize

          64KB

        • memory/4152-213-0x00007FFA615D0000-0x00007FFA617C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4152-214-0x00007FFA615D0000-0x00007FFA617C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4152-217-0x00007FFA1EE90000-0x00007FFA1EEA0000-memory.dmp

          Filesize

          64KB

        • memory/4152-207-0x00007FFA21650000-0x00007FFA21660000-memory.dmp

          Filesize

          64KB

        • memory/4152-206-0x00007FFA615D0000-0x00007FFA617C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4152-221-0x00007FFA1EE90000-0x00007FFA1EEA0000-memory.dmp

          Filesize

          64KB

        • memory/4152-237-0x00007FFA615D0000-0x00007FFA617C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4152-205-0x00007FFA21650000-0x00007FFA21660000-memory.dmp

          Filesize

          64KB

        • memory/4152-204-0x00007FFA615D0000-0x00007FFA617C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4152-203-0x00007FFA21650000-0x00007FFA21660000-memory.dmp

          Filesize

          64KB

        • memory/4152-236-0x00007FFA615D0000-0x00007FFA617C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4152-208-0x00007FFA615D0000-0x00007FFA617C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4636-234-0x0000000000400000-0x000000000052F000-memory.dmp

          Filesize

          1.2MB

        • memory/4636-223-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/4636-136-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/4636-239-0x0000000000400000-0x000000000052F000-memory.dmp

          Filesize

          1.2MB

        • memory/4636-264-0x0000000000400000-0x000000000052F000-memory.dmp

          Filesize

          1.2MB