Resubmissions
16/03/2023, 02:26
230316-cxcp2aag91 1015/03/2023, 21:37
230315-1gp77ahf5v 1015/03/2023, 21:32
230315-1dtffafd59 4Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
8846_0.one
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8846_0.one
Resource
win10v2004-20230220-en
General
-
Target
8846_0.one
-
Size
117KB
-
MD5
b4d388fd8748c7a725541d8a53151a51
-
SHA1
dc348918f86f3f96b8a508d9ab18788d20ae97d5
-
SHA256
5697f2ac10e6f1a82497b6b8b19df905f77980ed0644ccd93d2e7bdbfd912241
-
SHA512
410ab97d0d0fded07650287e4cc66eb9f54fa91ea1c0a8a1de57a723a11ae340de917549b85e7cd951249b58cf6aa213dc9f87e0af9f2dcf56e96abe1eb29439
-
SSDEEP
1536:RDBoTVdaeNtuXndCrJJmT4HVnteV4FrdMiYcx7bfCb6HPdnXI:1BoC+tCYvSMVnte8ZP1Y6JY
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE is not expected to spawn this process 2872 2660 WScript.exe 51 -
Blocklisted process makes network request 7 IoCs
flow pid Process 57 2872 WScript.exe 59 2872 WScript.exe 61 2872 WScript.exe 63 2872 WScript.exe 65 2872 WScript.exe 71 2872 WScript.exe 73 2872 WScript.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1128 4084 WerFault.exe 90 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Script User-Agent 7 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 65 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 71 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 73 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 57 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 59 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 61 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 63 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2660 ONENOTE.EXE 2660 ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 ONENOTE.EXE 2660 ONENOTE.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE 2660 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2872 2660 ONENOTE.EXE 94 PID 2660 wrote to memory of 2872 2660 ONENOTE.EXE 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE"C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\Temp\8846_0.one"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\OneNote\16.0\Exported\{283C8296-4F1B-4CD6-A468-D98FC5BB6BCB}\NT\0\click.wsf"2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
PID:2872
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 472 -p 4084 -ip 40841⤵PID:1544
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4084 -s 8441⤵
- Program crash
PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5ae25f2104967b2708ac9dba80aac52fd
SHA17ac0150b43cbb5eeba9a0f956e1291df6790f3bf
SHA25611b3d1564b12934489281250c9a683f076fe10254bfdd7da72307e538838ec56
SHA512d4a7f95631e7eb88fdadbe66d31bf9c7459d0f80ca2c9174952aad42bff6262241b25916e6a089f778990be981a2cf220baa69ad261314247c286397553decca
-
Filesize
567B
MD5d055ce625528e448c61315eaaef5bb71
SHA1029df4c872b1c154f32e7fe94f434547c3ba6192
SHA25685bf1e672b4e86e9af0c7874681ec9620dfdc78e0335b83eef38c17d813b6705
SHA512705b6b729e967fa946469571109aa892f5cb55a01c74d40ae02140d10cbf9b65dd5e511c06ebfe494e407742f8c6f4fbbe88664b78b37abfb2f19db1f66f4247
-
Filesize
48KB
MD5b7fc313714edd7866f4c76527282c2b5
SHA1c86217b46956933fae4a30483a63b33f34b8c503
SHA256b6d25f5eb52d5c24ef6c325bd25f18e413f3e23d20413a3693749275ba4b192c
SHA512038a73b7a69dd976c964f1538f5b4f7c6c64721e4f2f1a831815598faae84cac53305c03f5cea6e66acdc110a9a5117eee191345ea004b9576c752122f8d88f7
-
C:\Users\Admin\AppData\Local\Temp\OneNote\16.0\Exported\{283C8296-4F1B-4CD6-A468-D98FC5BB6BCB}\NT\0\click.wsf
Filesize53KB
MD5ae25f2104967b2708ac9dba80aac52fd
SHA17ac0150b43cbb5eeba9a0f956e1291df6790f3bf
SHA25611b3d1564b12934489281250c9a683f076fe10254bfdd7da72307e538838ec56
SHA512d4a7f95631e7eb88fdadbe66d31bf9c7459d0f80ca2c9174952aad42bff6262241b25916e6a089f778990be981a2cf220baa69ad261314247c286397553decca
-
C:\Users\Admin\AppData\Local\Temp\OneNote\16.0\Exported\{283C8296-4F1B-4CD6-A468-D98FC5BB6BCB}\NT\0\rad9E505.tmp.dll
Filesize10B
MD57605968e79d0ca095ab1231486d2b814
SHA1a007b420d19ceefa840f0373e050e3b51a4ab480
SHA256493fda53120050f85836032324409be6c6484f90a0755ae0c6a673ba7626818b
SHA512769249da7ed6c6bf5671bbc2371a6453b433226ceb8c4c2aa3604000d66647bcec83dee1ab64c0262fa40f923d77e23bad2c47274d339effc51d904ce77072a6