Analysis
-
max time kernel
292s -
max time network
239s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
Wd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Wd.exe
Resource
win10v2004-20240709-en
General
-
Target
Wd.exe
-
Size
1.6MB
-
MD5
08c74fc23f2203665fede63712a7af5b
-
SHA1
eb0c2bb3f6de77dad73c37e72f1960f653341375
-
SHA256
a2e3d3090a86107f7f77dd88bc75f3aaf74cc48427215a8da2e643887a5373b1
-
SHA512
e021c3a661e6c4ea2ac8ea980fad574b22a63620d6a3a5ede325e278914d6560fb5836dbd3d817909404f8167c17fade77437aa38ab2484a8c5a45a340037bca
-
SSDEEP
49152:knsHyjtk2MYC5GDZ/QMnl5YL7WzZyQRdO:knsmtk2aKPC0oQi
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2132 ._cache_Wd.exe 2868 Synaptics.exe 308 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 1676 Wd.exe 1676 Wd.exe 1676 Wd.exe 2868 Synaptics.exe 2868 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Wd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2588 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2588 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2132 1676 Wd.exe 28 PID 1676 wrote to memory of 2132 1676 Wd.exe 28 PID 1676 wrote to memory of 2132 1676 Wd.exe 28 PID 1676 wrote to memory of 2132 1676 Wd.exe 28 PID 1676 wrote to memory of 2868 1676 Wd.exe 29 PID 1676 wrote to memory of 2868 1676 Wd.exe 29 PID 1676 wrote to memory of 2868 1676 Wd.exe 29 PID 1676 wrote to memory of 2868 1676 Wd.exe 29 PID 2868 wrote to memory of 308 2868 Synaptics.exe 30 PID 2868 wrote to memory of 308 2868 Synaptics.exe 30 PID 2868 wrote to memory of 308 2868 Synaptics.exe 30 PID 2868 wrote to memory of 308 2868 Synaptics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Wd.exe"C:\Users\Admin\AppData\Local\Temp\Wd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\._cache_Wd.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Wd.exe"2⤵
- Executes dropped EXE
PID:2132
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:308
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD508c74fc23f2203665fede63712a7af5b
SHA1eb0c2bb3f6de77dad73c37e72f1960f653341375
SHA256a2e3d3090a86107f7f77dd88bc75f3aaf74cc48427215a8da2e643887a5373b1
SHA512e021c3a661e6c4ea2ac8ea980fad574b22a63620d6a3a5ede325e278914d6560fb5836dbd3d817909404f8167c17fade77437aa38ab2484a8c5a45a340037bca
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
29KB
MD50f11a2c4a2ffc6bd06788ca5da0b7463
SHA1043226d64128a01285b0be0f8b20afb73715666b
SHA256847a8d719a69e01db706b019bbee0c9530d439426ce4ff75e99f4fdef111fd45
SHA512b27848822ba22490abdbb886befd351d56815b59d509b4288b1a5e05cccc174c1bfefbe3a3d53e5601f16da2a7c76b2c13e4467ec28606a792c3588fad727086
-
Filesize
26KB
MD56587880be7f5568d56b909058423cd71
SHA14b18433f51025db085f53103b213c34f17069a76
SHA256fb354ae8071e1899eba92dd0c8d68b7f084e2d70993cb14b9102003961ba960a
SHA51296ec2de12ca239ed9f930fef5eddef92baddf1c44be7bce357d1c338b10e60abba747167ea7e028535840b43b1bd2adfabf2a8ca95599abdcfa7860de8116b0c
-
Filesize
30KB
MD5b0e3f52b146d404ce40d753a873ded56
SHA14e503e042838f6dd5a5a18a69e1b53dc0b146a73
SHA25635ac915137bcdfb703bc26f2f7e45770200ca35d0d2fe8279e3e8750402ed22e
SHA5122094616a0fc177336cee08a37aa126a9cc5bc103f772d8dd1fa6bae71f30c44ad337a72cd6d6ef2936495defa92062d7952624d43d6815006a9c7bfb26424be4
-
Filesize
27KB
MD5493b41ba15a166baf4cde5412d302e23
SHA18580d1d7d2c49cafad195e10a25f5610bc2bd9a6
SHA256a822c5ec3e23dc05cd7aa64a6516733d985c60baa98812043802b40c68070d0c
SHA512b80597bb9532e6b74154abe0d968ccdca15c4431269e6fc9b5970f9a0c14d7e5e8740e2b99e6c89a9477fd9592670ef7204d5fcd1ec37349414df507383576d2
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
893KB
MD5b6af97aa32c636c3c4e87bb768a3ceb7
SHA183054af67df43ae70c7f8ac6e8a499d9c9dd82ec
SHA256ba35b8b4346b79b8bb4f97360025cb6befaf501b03149a3b5fef8f07bdf265c7
SHA51254d2e806503f8a4145ee1519fc5e93cef6bf352cf20042569466f6c402b0a402bce99066decd7729c415cd57da7a9923a1b65926b242672731fe2f9709cf6920