Overview
overview
8Static
static
8Office 201...ll.exe
windows7-x64
8Office 201...ll.exe
windows10-2004-x64
Office 201...up.exe
windows7-x64
7Office 201...up.exe
windows10-2004-x64
7Office 201...pp.exe
windows7-x64
1Office 201...pp.exe
windows10-2004-x64
1Office 201...00.dll
windows7-x64
3Office 201...00.dll
windows10-2004-x64
3Office 201...pp.exe
windows7-x64
1Office 201...pp.exe
windows10-2004-x64
1Office 201...00.dll
windows7-x64
3Office 201...00.dll
windows10-2004-x64
3Analysis
-
max time kernel
20s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2023, 20:53
Behavioral task
behavioral1
Sample
Office 2013-2019 C2R Install v6.4.4/OInstall.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Office 2013-2019 C2R Install v6.4.4/OInstall.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Office 2013-2019 C2R Install v6.4.4/files/setup.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Office 2013-2019 C2R Install v6.4.4/files/setup.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Office 2013-2019 C2R Install v6.4.4/files/x64/cleanospp.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Office 2013-2019 C2R Install v6.4.4/files/x64/cleanospp.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
Office 2013-2019 C2R Install v6.4.4/files/x64/msvcr100.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Office 2013-2019 C2R Install v6.4.4/files/x64/msvcr100.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Office 2013-2019 C2R Install v6.4.4/files/x86/cleanospp.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
Office 2013-2019 C2R Install v6.4.4/files/x86/cleanospp.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
Office 2013-2019 C2R Install v6.4.4/files/x86/msvcr100.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
Office 2013-2019 C2R Install v6.4.4/files/x86/msvcr100.dll
Resource
win10v2004-20220901-en
Errors
General
-
Target
Office 2013-2019 C2R Install v6.4.4/OInstall.exe
-
Size
9.5MB
-
MD5
f71556138c9eb716330063156db4a6bc
-
SHA1
bd91945d407cbeee830c15280c8324459f0ff61a
-
SHA256
41ff83c380b958e918c4061c02a6077590d7630a01d7f2f0f448dc1a6fbf284a
-
SHA512
259642e8b2398122f00b031f6af4e79a2cea0831b4ef00c0f118f1fd28d32c92122a118921ce2af915f141273a2774ccf9abdfdc596175ac3c190e8f891c139e
-
SSDEEP
196608:vp1crEM65aqMLvUcm+oz3BkeBTAUW24t13Dr7m0mitn2xe7gXQZ+3jeRBTfYNCH1:hurEzabjm+4keB0vt1Dr7m0mc2xe7gAN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1392-132-0x0000000000400000-0x00000000015B4000-memory.dmp upx behavioral2/memory/1392-134-0x0000000000400000-0x00000000015B4000-memory.dmp upx behavioral2/memory/1392-135-0x0000000000400000-0x00000000015B4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "169" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1528 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1648 1392 OInstall.exe 79 PID 1392 wrote to memory of 1648 1392 OInstall.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\Office 2013-2019 C2R Install v6.4.4\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\Office 2013-2019 C2R Install v6.4.4\OInstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\system32\cmd.exe"C:\Windows\Sysnative\cmd.exe" /D /c copy C:\Windows\system32\Tasks\OInstall "C:\Windows\Temp\OInstall.tmp" /Y2⤵PID:1648
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39ec855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1528