Analysis
-
max time kernel
181s -
max time network
203s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 18:38
Static task
static1
Behavioral task
behavioral1
Sample
59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce.exe
Resource
win10-en-20211208
General
-
Target
59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce.exe
-
Size
699KB
-
MD5
0d3fbc842a430f5367d480dd1b74449b
-
SHA1
bd2533005a2eaed203054fd649fdbdcd3e3a860a
-
SHA256
59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce
-
SHA512
aa06bebcb55175fb9dd08eb1810d72ef598a85fa8bf548609b5d6c3b7c7ee68e7b660436b29d4b189eae3631bcf0fffa6112989ca99a52d1ada3740ee16289de
Malware Config
Extracted
plugx
www.apple-net.com:80
www.apple-net.com:53
www.apple-net.com:8080
www.apple-net.com:443
-
folder
ESET Malware ProtectionOWT
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3052 NATIONAL SECURITY CONCEPT OF MONGOLIA.exe 2876 unsecapp.exe -
Loads dropped DLL 2 IoCs
pid Process 3052 NATIONAL SECURITY CONCEPT OF MONGOLIA.exe 2876 unsecapp.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run NATIONAL SECURITY CONCEPT OF MONGOLIA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ESET Malware ProtectionOWT = "\"C:\\ProgramData\\ESET Malware ProtectionOWT\\unsecapp.exe\" -app" NATIONAL SECURITY CONCEPT OF MONGOLIA.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run NATIONAL SECURITY CONCEPT OF MONGOLIA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\ESET Malware ProtectionOWT = "\"C:\\ProgramData\\ESET Malware ProtectionOWT\\unsecapp.exe\" -app" NATIONAL SECURITY CONCEPT OF MONGOLIA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ms-pu\PROXY unsecapp.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu\PROXY unsecapp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ms-pu unsecapp.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2912 WINWORD.EXE 2912 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2876 unsecapp.exe Token: SeTcbPrivilege 2876 unsecapp.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2912 WINWORD.EXE 2912 WINWORD.EXE 2912 WINWORD.EXE 2912 WINWORD.EXE 2912 WINWORD.EXE 2912 WINWORD.EXE 2912 WINWORD.EXE 2912 WINWORD.EXE 2912 WINWORD.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2780 wrote to memory of 3484 2780 59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce.exe 71 PID 2780 wrote to memory of 3484 2780 59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce.exe 71 PID 2780 wrote to memory of 3484 2780 59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce.exe 71 PID 2780 wrote to memory of 1304 2780 59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce.exe 72 PID 2780 wrote to memory of 1304 2780 59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce.exe 72 PID 2780 wrote to memory of 1304 2780 59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce.exe 72 PID 1304 wrote to memory of 3052 1304 rundll32.exe 73 PID 1304 wrote to memory of 3052 1304 rundll32.exe 73 PID 1304 wrote to memory of 3052 1304 rundll32.exe 73 PID 3052 wrote to memory of 2876 3052 NATIONAL SECURITY CONCEPT OF MONGOLIA.exe 74 PID 3052 wrote to memory of 2876 3052 NATIONAL SECURITY CONCEPT OF MONGOLIA.exe 74 PID 3052 wrote to memory of 2876 3052 NATIONAL SECURITY CONCEPT OF MONGOLIA.exe 74 PID 3484 wrote to memory of 2912 3484 rundll32.exe 75 PID 3484 wrote to memory of 2912 3484 rundll32.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce.exe"C:\Users\Admin\AppData\Local\Temp\59aaa2b8116ba01c1b37937db37213ff1f4a8552a7211ab21f73ffac2c0c13ce.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\NATIONAL SECURITY CONCEPT OF MONGOLIA.docx2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\NATIONAL SECURITY CONCEPT OF MONGOLIA.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2912
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\NATIONAL SECURITY CONCEPT OF MONGOLIA.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\NATIONAL SECURITY CONCEPT OF MONGOLIA.exe"C:\Users\Admin\AppData\Local\Temp\NATIONAL SECURITY CONCEPT OF MONGOLIA.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\ProgramData\ESET Malware ProtectionOWT\unsecapp.exe"C:\ProgramData\ESET Malware ProtectionOWT\unsecapp.exe" -app4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-