Analysis

  • max time kernel
    179s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 00:33

General

  • Target

    dae06ec2c7cd6868d4369fd86ca2d09ca5d1e161455f7b8ac59fd2537d8caa98.exe

  • Size

    151KB

  • MD5

    1ce14b8e33ac73d894733e89f2d1e630

  • SHA1

    ef4b77f0c5d4cd5e4be0df7a7b566cf555715ff3

  • SHA256

    dae06ec2c7cd6868d4369fd86ca2d09ca5d1e161455f7b8ac59fd2537d8caa98

  • SHA512

    4580d7d48867312712ea4aeb00ce521755eb732b6a86ac44c2825df24db11a1f5a3e57a02c0947e5857a3a7629caf073e03c6bbdc7923eda2e192d245516665e

  • SSDEEP

    3072:MbZEhqr8+IQ9r/To2+GmTkUSqlDkYl/dvwN5emUstAxXl:MmqA+I47+GzwBWtAxXl

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dae06ec2c7cd6868d4369fd86ca2d09ca5d1e161455f7b8ac59fd2537d8caa98.exe
    "C:\Users\Admin\AppData\Local\Temp\dae06ec2c7cd6868d4369fd86ca2d09ca5d1e161455f7b8ac59fd2537d8caa98.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Program Files\Microsoft Office\Root\Office16\winword.exe
      "C:\Program Files\Microsoft Office\Root\Office16\winword.exe"
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1988-132-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1988-134-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/4180-133-0x0000000000000000-mapping.dmp

  • memory/4180-135-0x00007FFC3C1F0000-0x00007FFC3C200000-memory.dmp

    Filesize

    64KB

  • memory/4180-137-0x00007FFC3C1F0000-0x00007FFC3C200000-memory.dmp

    Filesize

    64KB

  • memory/4180-136-0x00007FFC3C1F0000-0x00007FFC3C200000-memory.dmp

    Filesize

    64KB

  • memory/4180-138-0x00007FFC3C1F0000-0x00007FFC3C200000-memory.dmp

    Filesize

    64KB

  • memory/4180-139-0x00007FFC3C1F0000-0x00007FFC3C200000-memory.dmp

    Filesize

    64KB

  • memory/4180-140-0x00007FFC39FE0000-0x00007FFC39FF0000-memory.dmp

    Filesize

    64KB

  • memory/4180-141-0x00007FFC39FE0000-0x00007FFC39FF0000-memory.dmp

    Filesize

    64KB