Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 04:29

General

  • Target

    f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe

  • Size

    4.6MB

  • MD5

    006906e22d359fd41a49524107e75e86

  • SHA1

    38b53730d765adcda518b481f1ab5d3024957af8

  • SHA256

    f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3

  • SHA512

    63fef8cf255985dfa94c7eaa9892c8268f2bd10ca752f3f9fae6629dc24ff840dcef7c9c2ff5d3f80db0fda17f93708cbcf840fdcf636f40012ca2ea31b5fe4f

  • SSDEEP

    98304:cnsmtk2aguMhd86B7UgpBClmo+V/kjIynMqaSGd2bZ1SzZ:yLdu/6p3Clmou/S7ngtRZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe
    "C:\Users\Admin\AppData\Local\Temp\f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\._cache_f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:2160
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2532
        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2376
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
            4⤵
              PID:2164
      • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
        1⤵
        • Enumerates system info in registry
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2880

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Synaptics\Synaptics.exe

        Filesize

        4.6MB

        MD5

        006906e22d359fd41a49524107e75e86

        SHA1

        38b53730d765adcda518b481f1ab5d3024957af8

        SHA256

        f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3

        SHA512

        63fef8cf255985dfa94c7eaa9892c8268f2bd10ca752f3f9fae6629dc24ff840dcef7c9c2ff5d3f80db0fda17f93708cbcf840fdcf636f40012ca2ea31b5fe4f

      • C:\Users\Admin\AppData\Local\Temp\wvhjRTSU.xlsm

        Filesize

        17KB

        MD5

        e566fc53051035e1e6fd0ed1823de0f9

        SHA1

        00bc96c48b98676ecd67e81a6f1d7754e4156044

        SHA256

        8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

        SHA512

        a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

      • \Users\Admin\AppData\Local\Temp\._cache_f7829d5d888d6823ca534692343ae213224366b8631c1da5c5584c4e8a9cb2f3.exe

        Filesize

        3.9MB

        MD5

        6604a47d10c94c942dec1fca54d3eb05

        SHA1

        5ffd9c0ee6ea01f71cfa64c26afe11f2f375d14b

        SHA256

        2c5345c08e558e398a92a272b5897cd27d44bbcfc6dc70edadc0ea474d0bba1f

        SHA512

        b3f7c3196ea46364f39ca83d0082b658b2d05d33b6f3b2bd1265a1259ad1e4d560f3ef44887696a1689cebf3c32b69ac401b8b652f0f556aeeaba49eb132924f

      • memory/2240-27-0x0000000000400000-0x00000000008A9000-memory.dmp

        Filesize

        4.7MB

      • memory/2240-0-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2376-41-0x0000000000790000-0x00000000007AC000-memory.dmp

        Filesize

        112KB

      • memory/2376-38-0x0000000000050000-0x000000000043E000-memory.dmp

        Filesize

        3.9MB

      • memory/2376-40-0x0000000006910000-0x0000000006B34000-memory.dmp

        Filesize

        2.1MB

      • memory/2472-61-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-95-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-47-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-57-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-71-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-69-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-77-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-81-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-90-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-67-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-65-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-63-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-39-0x00000000051E0000-0x0000000005420000-memory.dmp

        Filesize

        2.2MB

      • memory/2472-87-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-101-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-99-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-97-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-49-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-93-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-91-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-85-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-83-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-79-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-75-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-73-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-59-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-55-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-53-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-51-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-45-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-43-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-42-0x0000000000720000-0x0000000000735000-memory.dmp

        Filesize

        84KB

      • memory/2472-18-0x0000000000280000-0x000000000066E000-memory.dmp

        Filesize

        3.9MB