Analysis
-
max time kernel
110s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe
Resource
win10v2004-20220901-en
General
-
Target
8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe
-
Size
847KB
-
MD5
2e72250ee937d3edb8dc9172454e6c40
-
SHA1
2f03af41bcc1a38efe05d0b76f7a30a92dd8cc6b
-
SHA256
8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95
-
SHA512
e240f7fa81fbe7d4771cc45aeb049de2f909ad8beaa77440e55187f399fa420bddbc12ae7601227c3ee86e9946c91608e497e09e79720719132883a0eb47d2be
-
SSDEEP
12288:PgvzTFzNZOO8GFmM7/8sYHKCi0rVbv3BdS0y4C8dYb9h5waJ5YHuhVH:iHMO8qmM7/vH4/BdS0y4C8dYD57JWOfH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ms.word = "C:\\Users\\Admin\\AppData\\Roaming\\WINWORD.EXE" 8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4976 WINWORD.EXE 4976 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE 4976 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4976 4896 8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe 80 PID 4896 wrote to memory of 4976 4896 8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe"C:\Users\Admin\AppData\Local\Temp\8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4976
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8720a981944d57ee0a797ac239ad976cb66fdfca3b0596b1567c49f74c2ffe95.exe.doc
Filesize11KB
MD51ce82e18db835054f8a7dd2624e12236
SHA10463fc1e58252bd697dcfde517e3c4cc78e45e55
SHA256f6344c54a786448d11ea3fd2600597a8cbb0bc8d0b6f3ea3ca5ce63100cdc9c1
SHA5124e9129fca7a18b4f42340ae9d9369f844e0890877e1f93894197087f47f956c5c9046b637e1966de7abf6207ec0143b75b47b45737329ea196501a9a4ec94345