Analysis
-
max time kernel
147s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
2623024aba1ee994dcb82e937a8beb59abbebf51b6aa4cde8434bb56458b47da.one
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2623024aba1ee994dcb82e937a8beb59abbebf51b6aa4cde8434bb56458b47da.one
Resource
win10v2004-20230221-en
General
-
Target
2623024aba1ee994dcb82e937a8beb59abbebf51b6aa4cde8434bb56458b47da.one
-
Size
123KB
-
MD5
1691d647ecc17d6b41c49a1303a0832c
-
SHA1
979670e264f7585a31362cf6e79d4187f18c95b1
-
SHA256
2623024aba1ee994dcb82e937a8beb59abbebf51b6aa4cde8434bb56458b47da
-
SHA512
d26ce32e57927f5e7c790d0cecb5149bf6c8dd2f0a7553edced9ca2e6224276296d5b932b3f400b5feac15f12b4c40405f6ed208c5676f6369bcaacf33e03d11
-
SSDEEP
1536:Dpjjjjjjjjjjjjjjjjjjjjjjjjjjjjjx15EjjjjjjCbjgmHjRqnUK1Gpljjjjjjm:DrZfHvnOvxy8XQD+
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 644 ONENOTE.EXE 644 ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 644 ONENOTE.EXE 644 ONENOTE.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE 644 ONENOTE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE"C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\Temp\2623024aba1ee994dcb82e937a8beb59abbebf51b6aa4cde8434bb56458b47da.one"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
662B
MD581fd12c4ba87adca9e5e6622bb4db599
SHA138dded7746ce406ca3b64426b7a3d07df73e2181
SHA25656c591684163edf300e404a3cb32cb40852b13504b9a8d65e1a80e8bdf286925
SHA5127f6cdee191c351a258d8a100777a358ebb0640f1b8ad620353e8d44b3ccab50766bec24823060c083bec2dded86da02e75d23a69fb938c9af1514dea55bd999b
-
Filesize
50KB
MD5f127c89687de91b2b242e3a5a73c39d4
SHA13e6a2f15b17c26bea011fbd2929eefceee0ebaa9
SHA256ccc85cc1ca05665e6777330c5188031d212166e8e2199924a7ce6b3952ece1bf
SHA5125534e00cf45b2f073b97f41ca6861729426457cb6b4ecfa23dd7728169fb1d48b00b2f0c9be2c9f4491114844e1760f4affadd1c21f7aeb5eeb3e763d8c40520
-
Filesize
381B
MD5f6fc09e4cfb121172bc5428849ca110a
SHA13b359108d0026e86be3823ad364fcc286edd02f4
SHA256ba9279b9e8217cdd2e03574c49ece4951cccef0a8f42d772fb5396998f54eaee
SHA512ddb404faa2421a40051706381d658573b28c1f8b4660baa9e733ce729b267429cb9a90d8b532322ae4e806a58a95eec73bab0322f5e357d2165ce1e4db989885