Analysis
-
max time kernel
77s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe
Resource
win7-20220414-en
General
-
Target
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe
-
Size
2.6MB
-
MD5
c6bdbd8da4de7fc864b4e2c518eb85a2
-
SHA1
1a73470ab381256484393f4e0e6c6372ca2e0649
-
SHA256
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b
-
SHA512
afe57691b96051c3133ce68910d855684296af7976895d791978a0d75e32b0257134caa60f3dea60d38b4828db7070adb3ccaba8374183cbf7c8421dacdb6778
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exeSmartClock.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SmartClock.exe -
Executes dropped EXE 1 IoCs
Processes:
SmartClock.exepid process 1280 SmartClock.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exeSmartClock.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe -
Drops startup file 1 IoCs
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe -
Loads dropped DLL 2 IoCs
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exepid process 1808 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe 1808 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe -
Processes:
resource yara_rule behavioral1/memory/1808-55-0x0000000000800000-0x0000000000E92000-memory.dmp themida behavioral1/memory/1808-56-0x0000000000800000-0x0000000000E92000-memory.dmp themida behavioral1/memory/1808-57-0x0000000000800000-0x0000000000E92000-memory.dmp themida behavioral1/memory/1808-58-0x0000000000800000-0x0000000000E92000-memory.dmp themida behavioral1/memory/1808-59-0x0000000000800000-0x0000000000E92000-memory.dmp themida behavioral1/memory/1808-60-0x0000000000800000-0x0000000000E92000-memory.dmp themida \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe themida behavioral1/memory/1808-64-0x0000000000800000-0x0000000000E92000-memory.dmp themida \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe themida C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe themida behavioral1/memory/1808-70-0x0000000000800000-0x0000000000E92000-memory.dmp themida behavioral1/memory/1280-72-0x0000000000FD0000-0x0000000001662000-memory.dmp themida behavioral1/memory/1280-73-0x0000000000FD0000-0x0000000001662000-memory.dmp themida behavioral1/memory/1280-74-0x0000000000FD0000-0x0000000001662000-memory.dmp themida behavioral1/memory/1280-75-0x0000000000FD0000-0x0000000001662000-memory.dmp themida behavioral1/memory/1280-76-0x0000000000FD0000-0x0000000001662000-memory.dmp themida behavioral1/memory/1280-78-0x0000000000FD0000-0x0000000001662000-memory.dmp themida behavioral1/memory/1280-80-0x0000000000FD0000-0x0000000001662000-memory.dmp themida -
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exeSmartClock.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SmartClock.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exeSmartClock.exepid process 1808 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe 1280 SmartClock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 1280 SmartClock.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exedescription pid process target process PID 1808 wrote to memory of 1280 1808 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe SmartClock.exe PID 1808 wrote to memory of 1280 1808 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe SmartClock.exe PID 1808 wrote to memory of 1280 1808 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe SmartClock.exe PID 1808 wrote to memory of 1280 1808 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe SmartClock.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe"C:\Users\Admin\AppData\Local\Temp\6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeFilesize
2.6MB
MD5c6bdbd8da4de7fc864b4e2c518eb85a2
SHA11a73470ab381256484393f4e0e6c6372ca2e0649
SHA2566bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b
SHA512afe57691b96051c3133ce68910d855684296af7976895d791978a0d75e32b0257134caa60f3dea60d38b4828db7070adb3ccaba8374183cbf7c8421dacdb6778
-
\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeFilesize
2.6MB
MD5c6bdbd8da4de7fc864b4e2c518eb85a2
SHA11a73470ab381256484393f4e0e6c6372ca2e0649
SHA2566bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b
SHA512afe57691b96051c3133ce68910d855684296af7976895d791978a0d75e32b0257134caa60f3dea60d38b4828db7070adb3ccaba8374183cbf7c8421dacdb6778
-
\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeFilesize
2.6MB
MD5c6bdbd8da4de7fc864b4e2c518eb85a2
SHA11a73470ab381256484393f4e0e6c6372ca2e0649
SHA2566bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b
SHA512afe57691b96051c3133ce68910d855684296af7976895d791978a0d75e32b0257134caa60f3dea60d38b4828db7070adb3ccaba8374183cbf7c8421dacdb6778
-
memory/1280-73-0x0000000000FD0000-0x0000000001662000-memory.dmpFilesize
6.6MB
-
memory/1280-67-0x0000000000000000-mapping.dmp
-
memory/1280-80-0x0000000000FD0000-0x0000000001662000-memory.dmpFilesize
6.6MB
-
memory/1280-79-0x0000000077770000-0x00000000778F0000-memory.dmpFilesize
1.5MB
-
memory/1280-78-0x0000000000FD0000-0x0000000001662000-memory.dmpFilesize
6.6MB
-
memory/1280-77-0x0000000077770000-0x00000000778F0000-memory.dmpFilesize
1.5MB
-
memory/1280-76-0x0000000000FD0000-0x0000000001662000-memory.dmpFilesize
6.6MB
-
memory/1280-75-0x0000000000FD0000-0x0000000001662000-memory.dmpFilesize
6.6MB
-
memory/1280-74-0x0000000000FD0000-0x0000000001662000-memory.dmpFilesize
6.6MB
-
memory/1280-72-0x0000000000FD0000-0x0000000001662000-memory.dmpFilesize
6.6MB
-
memory/1808-63-0x00000000001B0000-0x00000000001C0000-memory.dmpFilesize
64KB
-
memory/1808-55-0x0000000000800000-0x0000000000E92000-memory.dmpFilesize
6.6MB
-
memory/1808-70-0x0000000000800000-0x0000000000E92000-memory.dmpFilesize
6.6MB
-
memory/1808-71-0x0000000077770000-0x00000000778F0000-memory.dmpFilesize
1.5MB
-
memory/1808-56-0x0000000000800000-0x0000000000E92000-memory.dmpFilesize
6.6MB
-
memory/1808-54-0x0000000075451000-0x0000000075453000-memory.dmpFilesize
8KB
-
memory/1808-65-0x00000000001B0000-0x00000000001C0000-memory.dmpFilesize
64KB
-
memory/1808-64-0x0000000000800000-0x0000000000E92000-memory.dmpFilesize
6.6MB
-
memory/1808-58-0x0000000000800000-0x0000000000E92000-memory.dmpFilesize
6.6MB
-
memory/1808-57-0x0000000000800000-0x0000000000E92000-memory.dmpFilesize
6.6MB
-
memory/1808-61-0x0000000077770000-0x00000000778F0000-memory.dmpFilesize
1.5MB
-
memory/1808-60-0x0000000000800000-0x0000000000E92000-memory.dmpFilesize
6.6MB
-
memory/1808-59-0x0000000000800000-0x0000000000E92000-memory.dmpFilesize
6.6MB