Analysis
-
max time kernel
148s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe
Resource
win7-20220414-en
General
-
Target
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe
-
Size
2.6MB
-
MD5
c6bdbd8da4de7fc864b4e2c518eb85a2
-
SHA1
1a73470ab381256484393f4e0e6c6372ca2e0649
-
SHA256
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b
-
SHA512
afe57691b96051c3133ce68910d855684296af7976895d791978a0d75e32b0257134caa60f3dea60d38b4828db7070adb3ccaba8374183cbf7c8421dacdb6778
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exeSmartClock.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SmartClock.exe -
Executes dropped EXE 1 IoCs
Processes:
SmartClock.exepid process 3632 SmartClock.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exeSmartClock.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SmartClock.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SmartClock.exe -
Drops startup file 1 IoCs
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe -
Processes:
resource yara_rule behavioral2/memory/1324-130-0x00000000004F0000-0x0000000000B82000-memory.dmp themida behavioral2/memory/1324-132-0x00000000004F0000-0x0000000000B82000-memory.dmp themida behavioral2/memory/1324-133-0x00000000004F0000-0x0000000000B82000-memory.dmp themida behavioral2/memory/1324-135-0x00000000004F0000-0x0000000000B82000-memory.dmp themida behavioral2/memory/1324-136-0x00000000004F0000-0x0000000000B82000-memory.dmp themida behavioral2/memory/1324-137-0x00000000004F0000-0x0000000000B82000-memory.dmp themida C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe themida behavioral2/memory/1324-142-0x00000000004F0000-0x0000000000B82000-memory.dmp themida C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe themida behavioral2/memory/3632-144-0x0000000000620000-0x0000000000CB2000-memory.dmp themida behavioral2/memory/3632-145-0x0000000000620000-0x0000000000CB2000-memory.dmp themida behavioral2/memory/3632-146-0x0000000000620000-0x0000000000CB2000-memory.dmp themida behavioral2/memory/3632-147-0x0000000000620000-0x0000000000CB2000-memory.dmp themida behavioral2/memory/3632-148-0x0000000000620000-0x0000000000CB2000-memory.dmp themida behavioral2/memory/3632-149-0x0000000000620000-0x0000000000CB2000-memory.dmp themida behavioral2/memory/3632-151-0x0000000000620000-0x0000000000CB2000-memory.dmp themida -
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exeSmartClock.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SmartClock.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exeSmartClock.exepid process 1324 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe 3632 SmartClock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 3632 SmartClock.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exedescription pid process target process PID 1324 wrote to memory of 3632 1324 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe SmartClock.exe PID 1324 wrote to memory of 3632 1324 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe SmartClock.exe PID 1324 wrote to memory of 3632 1324 6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe SmartClock.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe"C:\Users\Admin\AppData\Local\Temp\6bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeFilesize
2.6MB
MD5c6bdbd8da4de7fc864b4e2c518eb85a2
SHA11a73470ab381256484393f4e0e6c6372ca2e0649
SHA2566bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b
SHA512afe57691b96051c3133ce68910d855684296af7976895d791978a0d75e32b0257134caa60f3dea60d38b4828db7070adb3ccaba8374183cbf7c8421dacdb6778
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeFilesize
2.6MB
MD5c6bdbd8da4de7fc864b4e2c518eb85a2
SHA11a73470ab381256484393f4e0e6c6372ca2e0649
SHA2566bf0ff51fe6cedbce063dd18ee29f97f80cdd03e8ad38730def13979576b802b
SHA512afe57691b96051c3133ce68910d855684296af7976895d791978a0d75e32b0257134caa60f3dea60d38b4828db7070adb3ccaba8374183cbf7c8421dacdb6778
-
memory/1324-142-0x00000000004F0000-0x0000000000B82000-memory.dmpFilesize
6.6MB
-
memory/1324-132-0x00000000004F0000-0x0000000000B82000-memory.dmpFilesize
6.6MB
-
memory/1324-135-0x00000000004F0000-0x0000000000B82000-memory.dmpFilesize
6.6MB
-
memory/1324-136-0x00000000004F0000-0x0000000000B82000-memory.dmpFilesize
6.6MB
-
memory/1324-137-0x00000000004F0000-0x0000000000B82000-memory.dmpFilesize
6.6MB
-
memory/1324-138-0x00000000777B0000-0x0000000077953000-memory.dmpFilesize
1.6MB
-
memory/1324-143-0x00000000777B0000-0x0000000077953000-memory.dmpFilesize
1.6MB
-
memory/1324-134-0x00000000777B0000-0x0000000077953000-memory.dmpFilesize
1.6MB
-
memory/1324-130-0x00000000004F0000-0x0000000000B82000-memory.dmpFilesize
6.6MB
-
memory/1324-133-0x00000000004F0000-0x0000000000B82000-memory.dmpFilesize
6.6MB
-
memory/3632-139-0x0000000000000000-mapping.dmp
-
memory/3632-144-0x0000000000620000-0x0000000000CB2000-memory.dmpFilesize
6.6MB
-
memory/3632-145-0x0000000000620000-0x0000000000CB2000-memory.dmpFilesize
6.6MB
-
memory/3632-146-0x0000000000620000-0x0000000000CB2000-memory.dmpFilesize
6.6MB
-
memory/3632-147-0x0000000000620000-0x0000000000CB2000-memory.dmpFilesize
6.6MB
-
memory/3632-148-0x0000000000620000-0x0000000000CB2000-memory.dmpFilesize
6.6MB
-
memory/3632-150-0x00000000777B0000-0x0000000077953000-memory.dmpFilesize
1.6MB
-
memory/3632-149-0x0000000000620000-0x0000000000CB2000-memory.dmpFilesize
6.6MB
-
memory/3632-151-0x0000000000620000-0x0000000000CB2000-memory.dmpFilesize
6.6MB
-
memory/3632-152-0x00000000777B0000-0x0000000077953000-memory.dmpFilesize
1.6MB