Analysis

  • max time kernel
    292s
  • max time network
    239s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 09:02

General

  • Target

    Wd.exe

  • Size

    1.6MB

  • MD5

    08c74fc23f2203665fede63712a7af5b

  • SHA1

    eb0c2bb3f6de77dad73c37e72f1960f653341375

  • SHA256

    a2e3d3090a86107f7f77dd88bc75f3aaf74cc48427215a8da2e643887a5373b1

  • SHA512

    e021c3a661e6c4ea2ac8ea980fad574b22a63620d6a3a5ede325e278914d6560fb5836dbd3d817909404f8167c17fade77437aa38ab2484a8c5a45a340037bca

  • SSDEEP

    49152:knsHyjtk2MYC5GDZ/QMnl5YL7WzZyQRdO:knsmtk2aKPC0oQi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wd.exe
    "C:\Users\Admin\AppData\Local\Temp\Wd.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\._cache_Wd.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_Wd.exe"
      2⤵
      • Executes dropped EXE
      PID:2132
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        PID:308
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2588

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Synaptics\Synaptics.exe

          Filesize

          1.6MB

          MD5

          08c74fc23f2203665fede63712a7af5b

          SHA1

          eb0c2bb3f6de77dad73c37e72f1960f653341375

          SHA256

          a2e3d3090a86107f7f77dd88bc75f3aaf74cc48427215a8da2e643887a5373b1

          SHA512

          e021c3a661e6c4ea2ac8ea980fad574b22a63620d6a3a5ede325e278914d6560fb5836dbd3d817909404f8167c17fade77437aa38ab2484a8c5a45a340037bca

        • C:\Users\Admin\AppData\Local\Temp\vZOt88gd.xlsm

          Filesize

          17KB

          MD5

          e566fc53051035e1e6fd0ed1823de0f9

          SHA1

          00bc96c48b98676ecd67e81a6f1d7754e4156044

          SHA256

          8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

          SHA512

          a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

        • C:\Users\Admin\AppData\Local\Temp\vZOt88gd.xlsm

          Filesize

          29KB

          MD5

          0f11a2c4a2ffc6bd06788ca5da0b7463

          SHA1

          043226d64128a01285b0be0f8b20afb73715666b

          SHA256

          847a8d719a69e01db706b019bbee0c9530d439426ce4ff75e99f4fdef111fd45

          SHA512

          b27848822ba22490abdbb886befd351d56815b59d509b4288b1a5e05cccc174c1bfefbe3a3d53e5601f16da2a7c76b2c13e4467ec28606a792c3588fad727086

        • C:\Users\Admin\AppData\Local\Temp\vZOt88gd.xlsm

          Filesize

          26KB

          MD5

          6587880be7f5568d56b909058423cd71

          SHA1

          4b18433f51025db085f53103b213c34f17069a76

          SHA256

          fb354ae8071e1899eba92dd0c8d68b7f084e2d70993cb14b9102003961ba960a

          SHA512

          96ec2de12ca239ed9f930fef5eddef92baddf1c44be7bce357d1c338b10e60abba747167ea7e028535840b43b1bd2adfabf2a8ca95599abdcfa7860de8116b0c

        • C:\Users\Admin\AppData\Local\Temp\vZOt88gd.xlsm

          Filesize

          30KB

          MD5

          b0e3f52b146d404ce40d753a873ded56

          SHA1

          4e503e042838f6dd5a5a18a69e1b53dc0b146a73

          SHA256

          35ac915137bcdfb703bc26f2f7e45770200ca35d0d2fe8279e3e8750402ed22e

          SHA512

          2094616a0fc177336cee08a37aa126a9cc5bc103f772d8dd1fa6bae71f30c44ad337a72cd6d6ef2936495defa92062d7952624d43d6815006a9c7bfb26424be4

        • C:\Users\Admin\AppData\Local\Temp\vZOt88gd.xlsm

          Filesize

          27KB

          MD5

          493b41ba15a166baf4cde5412d302e23

          SHA1

          8580d1d7d2c49cafad195e10a25f5610bc2bd9a6

          SHA256

          a822c5ec3e23dc05cd7aa64a6516733d985c60baa98812043802b40c68070d0c

          SHA512

          b80597bb9532e6b74154abe0d968ccdca15c4431269e6fc9b5970f9a0c14d7e5e8740e2b99e6c89a9477fd9592670ef7204d5fcd1ec37349414df507383576d2

        • C:\Users\Admin\AppData\Local\Temp\~$vZOt88gd.xlsm

          Filesize

          165B

          MD5

          ff09371174f7c701e75f357a187c06e8

          SHA1

          57f9a638fd652922d7eb23236c80055a91724503

          SHA256

          e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8

          SHA512

          e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882

        • \Users\Admin\AppData\Local\Temp\._cache_Wd.exe

          Filesize

          893KB

          MD5

          b6af97aa32c636c3c4e87bb768a3ceb7

          SHA1

          83054af67df43ae70c7f8ac6e8a499d9c9dd82ec

          SHA256

          ba35b8b4346b79b8bb4f97360025cb6befaf501b03149a3b5fef8f07bdf265c7

          SHA512

          54d2e806503f8a4145ee1519fc5e93cef6bf352cf20042569466f6c402b0a402bce99066decd7729c415cd57da7a9923a1b65926b242672731fe2f9709cf6920

        • memory/1676-25-0x0000000000400000-0x00000000005A3000-memory.dmp

          Filesize

          1.6MB

        • memory/1676-0-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2588-35-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2588-111-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2868-112-0x0000000000400000-0x00000000005A3000-memory.dmp

          Filesize

          1.6MB

        • memory/2868-113-0x0000000000400000-0x00000000005A3000-memory.dmp

          Filesize

          1.6MB

        • memory/2868-145-0x0000000000400000-0x00000000005A3000-memory.dmp

          Filesize

          1.6MB