Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2022 18:17
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
2.3MB
-
MD5
5debae710acc279440b0fb96ad7ba5ef
-
SHA1
90d849a4c61b183b13dcce6a7622c0c9d569e96b
-
SHA256
b60004cf3b319182c85d8feeae4d3fc9d9f7cec8dd7740b1f7731f1d21cb11a8
-
SHA512
e83bcb367fe2b35a2e666f9873f765dc093286e71b5f8cb490e37964a92c57d0c570e42cf49df23bc81c751b3ee66f5a0fdcd2f2f657fe0c7c3c9298072e0001
-
SSDEEP
49152:ojOcnDWdf0c37oGtkJ/5Hb4bd/nG78GDeYDCThetBdDdMJoTdtqhpP:mOcDaf0mkddod/nbGEadM
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
G3tJhC8CzLowF7a0nG0n7FYM.exepid process 3440 G3tJhC8CzLowF7a0nG0n7FYM.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
G3tJhC8CzLowF7a0nG0n7FYM.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LOLPA4DESK = "\"C:\\Program Files (x86)\\ClipManagerP0\\ClipManager_Svc.exe\"" G3tJhC8CzLowF7a0nG0n7FYM.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 ipinfo.io 9 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
tmp.exedescription ioc process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol tmp.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI tmp.exe File opened for modification C:\Windows\System32\GroupPolicy tmp.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini tmp.exe -
Drops file in Program Files directory 2 IoCs
Processes:
G3tJhC8CzLowF7a0nG0n7FYM.exedescription ioc process File created C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe G3tJhC8CzLowF7a0nG0n7FYM.exe File opened for modification C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe G3tJhC8CzLowF7a0nG0n7FYM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4472 schtasks.exe 2344 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
tmp.exepid process 1812 tmp.exe 1812 tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
tmp.exeG3tJhC8CzLowF7a0nG0n7FYM.exedescription pid process target process PID 1812 wrote to memory of 3440 1812 tmp.exe G3tJhC8CzLowF7a0nG0n7FYM.exe PID 1812 wrote to memory of 3440 1812 tmp.exe G3tJhC8CzLowF7a0nG0n7FYM.exe PID 1812 wrote to memory of 3440 1812 tmp.exe G3tJhC8CzLowF7a0nG0n7FYM.exe PID 3440 wrote to memory of 2344 3440 G3tJhC8CzLowF7a0nG0n7FYM.exe schtasks.exe PID 3440 wrote to memory of 2344 3440 G3tJhC8CzLowF7a0nG0n7FYM.exe schtasks.exe PID 3440 wrote to memory of 2344 3440 G3tJhC8CzLowF7a0nG0n7FYM.exe schtasks.exe PID 3440 wrote to memory of 4472 3440 G3tJhC8CzLowF7a0nG0n7FYM.exe schtasks.exe PID 3440 wrote to memory of 4472 3440 G3tJhC8CzLowF7a0nG0n7FYM.exe schtasks.exe PID 3440 wrote to memory of 4472 3440 G3tJhC8CzLowF7a0nG0n7FYM.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Minor Policy\G3tJhC8CzLowF7a0nG0n7FYM.exe"C:\Users\Admin\Pictures\Minor Policy\G3tJhC8CzLowF7a0nG0n7FYM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr ""C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe"" /tn "LOLPA4DESK HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr ""C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe"" /tn "LOLPA4DESK LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Pictures\Minor Policy\G3tJhC8CzLowF7a0nG0n7FYM.exeFilesize
161KB
MD5a19ba7f0bf808aefee30b29e8f84fc83
SHA1a339f81ccc84ab7c1f93a8f6add6e08fa64a46ef
SHA256041f891934add72852c8fda245c95da959d7f98cc580383d198e42f2de039634
SHA51273fa9a3d628ae63c8b52c1a16f7b5c6e0a958886b57c0b2c7ab523e4ce29f62f3655a576e04487550a05d559370dfc0882bbc4393b278ff1bffb66390d275c71
-
C:\Users\Admin\Pictures\Minor Policy\G3tJhC8CzLowF7a0nG0n7FYM.exeFilesize
161KB
MD5a19ba7f0bf808aefee30b29e8f84fc83
SHA1a339f81ccc84ab7c1f93a8f6add6e08fa64a46ef
SHA256041f891934add72852c8fda245c95da959d7f98cc580383d198e42f2de039634
SHA51273fa9a3d628ae63c8b52c1a16f7b5c6e0a958886b57c0b2c7ab523e4ce29f62f3655a576e04487550a05d559370dfc0882bbc4393b278ff1bffb66390d275c71
-
memory/2344-135-0x0000000000000000-mapping.dmp
-
memory/3440-132-0x0000000000000000-mapping.dmp
-
memory/4472-136-0x0000000000000000-mapping.dmp