Overview
overview
1Static
static
1WinTroyBuilder.exe
windows7-x64
1WinTroyBuilder.exe
windows10-2004-x64
1WinTroyBuilder.exe
android-9-x86
WinTroyBuilder.exe
android-10-x64
WinTroyBuilder.exe
android-11-x64
WinTroyBuilder.exe
macos-10.15-amd64
1WinTroyBuilder.exe
ubuntu-18.04-amd64
WinTroyBuilder.exe
debian-9-armhf
WinTroyBuilder.exe
debian-9-mips
WinTroyBuilder.exe
debian-9-mipsel
Resubmissions
08-02-2023 04:17
230208-ewg98shb88 108-02-2023 04:10
230208-ervprsge81 702-02-2023 17:55
230202-whhsaagf32 10Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2023 04:17
Static task
static1
Behavioral task
behavioral1
Sample
WinTroyBuilder.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
WinTroyBuilder.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
WinTroyBuilder.exe
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral4
Sample
WinTroyBuilder.exe
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
WinTroyBuilder.exe
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
WinTroyBuilder.exe
Resource
macos-20220504-en
Behavioral task
behavioral7
Sample
WinTroyBuilder.exe
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral8
Sample
WinTroyBuilder.exe
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral9
Sample
WinTroyBuilder.exe
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral10
Sample
WinTroyBuilder.exe
Resource
debian9-mipsel-20221111-en
General
-
Target
WinTroyBuilder.exe
-
Size
2.8MB
-
MD5
3d46955ab2275455a983c1c327835366
-
SHA1
c18655daaaa564c2f4f2932f561f885cb1aff36b
-
SHA256
9bf03a8f81f0c51e9f1a9cd6016ecccf7443c1559e4e4b44547b8a13521b152a
-
SHA512
8d28dbc134d78b3ae21bf125a1eab81e6c9ab7d57c5148b3e0ac10dd40b76fe24b6846131f0224fb13d84cb0fe16f8d88cc5c97c5bbea5ec9e00960205c04332
-
SSDEEP
49152:fOPSa4ZImzdAxZmKLEb+T+VY07d7AidLAbbtwSjugkKNJxeWsoDjLX:fraitzdAfBEa0AiLAbbO0ugk8V
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3060 WINWORD.EXE 3060 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4880 WinTroyBuilder.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4880 WinTroyBuilder.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinTroyBuilder.exe"C:\Users\Admin\AppData\Local\Temp\WinTroyBuilder.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4880
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\ProtectUninstall.dot"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3060