Analysis
-
max time kernel
92s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2023, 00:19
Behavioral task
behavioral1
Sample
Clip1.exe
Resource
win7-20221111-en
General
-
Target
Clip1.exe
-
Size
6.3MB
-
MD5
93089639e68327d56f20ba0ba398a7ce
-
SHA1
b33f8f8f89b701ebfcd309b96b43aabcfd5adea6
-
SHA256
514537ab41632352ddf75c061baabc0858a61a61903fc3e1b084c7333c823bed
-
SHA512
e70bf9e62445fada987682d74bdc42df58ebf9c5f93fb1dccc533ed9f9b7f60989a8a031a8f9ae608a7d47387e3117293ab2081061620343c64dbe640a43bec7
-
SSDEEP
49152:lbFAUxQDHnn6L/PqHU0i9uN744gNjDIrT/YtkiyGKu4CwROURkZWFBXCUjiMXJ7P:N2rfqiH4vCYLyRCww07ji8mX1VK
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Clip1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WindowsPaint-Ver2.0.5.9.exe -
Executes dropped EXE 1 IoCs
pid Process 1156 WindowsPaint-Ver2.0.5.9.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Clip1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Clip1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WindowsPaint-Ver2.0.5.9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WindowsPaint-Ver2.0.5.9.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Clip1.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 896 icacls.exe 1148 icacls.exe 5084 icacls.exe -
resource yara_rule behavioral2/memory/3340-132-0x00007FF6803A0000-0x00007FF680A00000-memory.dmp themida behavioral2/memory/3340-133-0x00007FF6803A0000-0x00007FF680A00000-memory.dmp themida behavioral2/memory/3340-135-0x00007FF6803A0000-0x00007FF680A00000-memory.dmp themida behavioral2/files/0x0004000000022dc1-139.dat themida behavioral2/memory/3340-140-0x00007FF6803A0000-0x00007FF680A00000-memory.dmp themida behavioral2/files/0x0004000000022dc1-141.dat themida behavioral2/memory/1156-142-0x00007FF7DD810000-0x00007FF7DDE70000-memory.dmp themida behavioral2/memory/1156-143-0x00007FF7DD810000-0x00007FF7DDE70000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Clip1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsPaint-Ver2.0.5.9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4892 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3340 wrote to memory of 4892 3340 Clip1.exe 80 PID 3340 wrote to memory of 4892 3340 Clip1.exe 80 PID 3340 wrote to memory of 896 3340 Clip1.exe 86 PID 3340 wrote to memory of 896 3340 Clip1.exe 86 PID 3340 wrote to memory of 1148 3340 Clip1.exe 88 PID 3340 wrote to memory of 1148 3340 Clip1.exe 88 PID 3340 wrote to memory of 5084 3340 Clip1.exe 90 PID 3340 wrote to memory of 5084 3340 Clip1.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Clip1.exe"C:\Users\Admin\AppData\Local\Temp\Clip1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Windows\IntelComputingTooIklt\IntelPaint2.0.5.9." /TR "C:\ProgramData\MsiBoost\WindowsPaint-Ver2.0.5.9.exe" /SC MINUTE2⤵
- Creates scheduled task(s)
PID:4892
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoost" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:896
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoost" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:1148
-
-
C:\Windows\System32\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MsiBoost" /inheritance:e /deny "admin:(R,REA,RA,RD)"2⤵
- Modifies file permissions
PID:5084
-
-
C:\ProgramData\MsiBoost\WindowsPaint-Ver2.0.5.9.exeC:\ProgramData\MsiBoost\WindowsPaint-Ver2.0.5.9.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:1156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1078.8MB
MD556437dcc94ad414bc10cd2d90457d8de
SHA1e921cc93fcee6ed7cc22ea15897345e6e4d8964f
SHA2566e763eabaefdd7b83ec43d8e135cb21e07f9e57e6d815b0add0f4177b0c56eb3
SHA512eaa9fa0976a49529c06045fa8e3f3b8d29e6cf58cea628f66b982b3caaa93a88da543bbe55ef1ab001a524a9535988f11ddb4a40561e8858f904f92e596f2705
-
Filesize
1078.8MB
MD556437dcc94ad414bc10cd2d90457d8de
SHA1e921cc93fcee6ed7cc22ea15897345e6e4d8964f
SHA2566e763eabaefdd7b83ec43d8e135cb21e07f9e57e6d815b0add0f4177b0c56eb3
SHA512eaa9fa0976a49529c06045fa8e3f3b8d29e6cf58cea628f66b982b3caaa93a88da543bbe55ef1ab001a524a9535988f11ddb4a40561e8858f904f92e596f2705