Analysis
-
max time kernel
121s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2022 14:00
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
2.3MB
-
MD5
5debae710acc279440b0fb96ad7ba5ef
-
SHA1
90d849a4c61b183b13dcce6a7622c0c9d569e96b
-
SHA256
b60004cf3b319182c85d8feeae4d3fc9d9f7cec8dd7740b1f7731f1d21cb11a8
-
SHA512
e83bcb367fe2b35a2e666f9873f765dc093286e71b5f8cb490e37964a92c57d0c570e42cf49df23bc81c751b3ee66f5a0fdcd2f2f657fe0c7c3c9298072e0001
-
SSDEEP
49152:ojOcnDWdf0c37oGtkJ/5Hb4bd/nG78GDeYDCThetBdDdMJoTdtqhpP:mOcDaf0mkddod/nbGEadM
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
4wuQfWFbRDGR0NoDHO29hq5R.exepid process 1312 4wuQfWFbRDGR0NoDHO29hq5R.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
4wuQfWFbRDGR0NoDHO29hq5R.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LOLPA4DESK = "\"C:\\Program Files (x86)\\ClipManagerP0\\ClipManager_Svc.exe\"" 4wuQfWFbRDGR0NoDHO29hq5R.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ipinfo.io 10 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
tmp.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy tmp.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini tmp.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol tmp.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI tmp.exe -
Drops file in Program Files directory 2 IoCs
Processes:
4wuQfWFbRDGR0NoDHO29hq5R.exedescription ioc process File created C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe 4wuQfWFbRDGR0NoDHO29hq5R.exe File opened for modification C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe 4wuQfWFbRDGR0NoDHO29hq5R.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
tmp.exepid process 4220 tmp.exe 4220 tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
tmp.exe4wuQfWFbRDGR0NoDHO29hq5R.exedescription pid process target process PID 4220 wrote to memory of 1312 4220 tmp.exe 4wuQfWFbRDGR0NoDHO29hq5R.exe PID 4220 wrote to memory of 1312 4220 tmp.exe 4wuQfWFbRDGR0NoDHO29hq5R.exe PID 4220 wrote to memory of 1312 4220 tmp.exe 4wuQfWFbRDGR0NoDHO29hq5R.exe PID 1312 wrote to memory of 5088 1312 4wuQfWFbRDGR0NoDHO29hq5R.exe schtasks.exe PID 1312 wrote to memory of 5088 1312 4wuQfWFbRDGR0NoDHO29hq5R.exe schtasks.exe PID 1312 wrote to memory of 5088 1312 4wuQfWFbRDGR0NoDHO29hq5R.exe schtasks.exe PID 1312 wrote to memory of 216 1312 4wuQfWFbRDGR0NoDHO29hq5R.exe schtasks.exe PID 1312 wrote to memory of 216 1312 4wuQfWFbRDGR0NoDHO29hq5R.exe schtasks.exe PID 1312 wrote to memory of 216 1312 4wuQfWFbRDGR0NoDHO29hq5R.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Minor Policy\4wuQfWFbRDGR0NoDHO29hq5R.exe"C:\Users\Admin\Pictures\Minor Policy\4wuQfWFbRDGR0NoDHO29hq5R.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr ""C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe"" /tn "LOLPA4DESK HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr ""C:\Program Files (x86)\ClipManagerP0\ClipManager_Svc.exe"" /tn "LOLPA4DESK LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Pictures\Minor Policy\4wuQfWFbRDGR0NoDHO29hq5R.exeFilesize
161KB
MD5a19ba7f0bf808aefee30b29e8f84fc83
SHA1a339f81ccc84ab7c1f93a8f6add6e08fa64a46ef
SHA256041f891934add72852c8fda245c95da959d7f98cc580383d198e42f2de039634
SHA51273fa9a3d628ae63c8b52c1a16f7b5c6e0a958886b57c0b2c7ab523e4ce29f62f3655a576e04487550a05d559370dfc0882bbc4393b278ff1bffb66390d275c71
-
C:\Users\Admin\Pictures\Minor Policy\4wuQfWFbRDGR0NoDHO29hq5R.exeFilesize
161KB
MD5a19ba7f0bf808aefee30b29e8f84fc83
SHA1a339f81ccc84ab7c1f93a8f6add6e08fa64a46ef
SHA256041f891934add72852c8fda245c95da959d7f98cc580383d198e42f2de039634
SHA51273fa9a3d628ae63c8b52c1a16f7b5c6e0a958886b57c0b2c7ab523e4ce29f62f3655a576e04487550a05d559370dfc0882bbc4393b278ff1bffb66390d275c71
-
memory/216-136-0x0000000000000000-mapping.dmp
-
memory/1312-132-0x0000000000000000-mapping.dmp
-
memory/5088-135-0x0000000000000000-mapping.dmp