Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2023 13:50
Static task
static1
Behavioral task
behavioral1
Sample
Clip1.exe
Resource
win7-20230220-en
General
-
Target
Clip1.exe
-
Size
3.4MB
-
MD5
7c3ba41716690f6d5bca3520700e894c
-
SHA1
d8112039a130dd3d406c8b2386cce5ef8a745ce0
-
SHA256
4e45051d214af572935596233db47eee57ceb6600841815dc51171dee15840f5
-
SHA512
a3f6251d657d7abd982d68252c5085fe0393384c3edb37c19a750afbe95adeb926d5586f54be4f3ea1b314b533bd0676de35f7bd22460f1c0cefc464c8cbf23b
-
SSDEEP
49152:rr1c7Kvf8e9HTgXHXayMSTQ5c1ztH9rDDQvOJRg05T0Oa/rm2ho8IucxzrurVlo9:gKvfd94XayMT5sH9M0aS8o9uWyUhHyk
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TemplatesOracle-type0.0.0.0.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TemplatesOracle-type0.0.0.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TemplatesOracle-type0.0.0.0.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 TemplatesOracle-type0.0.0.0.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 4676 icacls.exe 2632 icacls.exe 2536 icacls.exe -
resource yara_rule behavioral2/files/0x0006000000023157-149.dat upx behavioral2/files/0x0006000000023157-152.dat upx behavioral2/files/0x0006000000023157-151.dat upx behavioral2/memory/2212-154-0x00007FF795010000-0x00007FF79552F000-memory.dmp upx behavioral2/memory/2212-155-0x00007FF795010000-0x00007FF79552F000-memory.dmp upx behavioral2/memory/2212-156-0x00007FF795010000-0x00007FF79552F000-memory.dmp upx behavioral2/memory/2212-157-0x00007FF795010000-0x00007FF79552F000-memory.dmp upx behavioral2/memory/2212-158-0x00007FF795010000-0x00007FF79552F000-memory.dmp upx behavioral2/memory/2212-159-0x00007FF795010000-0x00007FF79552F000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TemplatesOracle-type0.0.0.0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3588 set thread context of 728 3588 Clip1.exe 87 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4828 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3588 wrote to memory of 728 3588 Clip1.exe 87 PID 3588 wrote to memory of 728 3588 Clip1.exe 87 PID 3588 wrote to memory of 728 3588 Clip1.exe 87 PID 3588 wrote to memory of 728 3588 Clip1.exe 87 PID 3588 wrote to memory of 728 3588 Clip1.exe 87 PID 728 wrote to memory of 4676 728 AppLaunch.exe 94 PID 728 wrote to memory of 4676 728 AppLaunch.exe 94 PID 728 wrote to memory of 4676 728 AppLaunch.exe 94 PID 728 wrote to memory of 2632 728 AppLaunch.exe 96 PID 728 wrote to memory of 2632 728 AppLaunch.exe 96 PID 728 wrote to memory of 2632 728 AppLaunch.exe 96 PID 728 wrote to memory of 2536 728 AppLaunch.exe 98 PID 728 wrote to memory of 2536 728 AppLaunch.exe 98 PID 728 wrote to memory of 2536 728 AppLaunch.exe 98 PID 728 wrote to memory of 4828 728 AppLaunch.exe 100 PID 728 wrote to memory of 4828 728 AppLaunch.exe 100 PID 728 wrote to memory of 4828 728 AppLaunch.exe 100 PID 728 wrote to memory of 2212 728 AppLaunch.exe 102 PID 728 wrote to memory of 2212 728 AppLaunch.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Clip1.exe"C:\Users\Admin\AppData\Local\Temp\Clip1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\TemplatesOracle-type0.0.0.0" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4676
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\TemplatesOracle-type0.0.0.0" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2632
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\TemplatesOracle-type0.0.0.0" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2536
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "TemplatesOracle-type0.0.0.0\TemplatesOracle-type0.0.0.0" /TR "C:\ProgramData\TemplatesOracle-type0.0.0.0\TemplatesOracle-type0.0.0.0.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:4828
-
-
C:\ProgramData\TemplatesOracle-type0.0.0.0\TemplatesOracle-type0.0.0.0.exe"C:\ProgramData\TemplatesOracle-type0.0.0.0\TemplatesOracle-type0.0.0.0.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2212
-
-
-
C:\ProgramData\TemplatesOracle-type0.0.0.0\TemplatesOracle-type0.0.0.0.exeC:\ProgramData\TemplatesOracle-type0.0.0.0\TemplatesOracle-type0.0.0.0.exe1⤵PID:4852
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512.2MB
MD5ecd270160df0fb019d45742bfc3490ed
SHA1bedadd3158d244f05981711797c7eea42163ff20
SHA256729a98ebcbb1c00bb662fe1329e5e66172c3666d8f82a4c5d358d9eb129a1dfa
SHA5120c0b6c8af002b2faa57926250c88d6bfc97bf7c4b70023ab5c0d850f8197e90e74ead84435eb3465ce3a1a9aba818077581f59a36930e3efe2285ae5dd7ea059
-
Filesize
557.4MB
MD54109a7f0dd84c4e68f11aa1ad90b359d
SHA1d3c178fa3061a41c3c279238f3d3ea1480671596
SHA256be339a6c3706d4520110736be8c57c19e83c0b0ee097e3ea9b4255c6c6579b26
SHA512465ea8b1849b8cd6abcd2524f9d54472fc62e3f0ef775d17f4e330624bc7f1347cd7c9c7534df7aab8f342681954b57998f7ffc4e0a1c65c56588d7b81b4e782
-
Filesize
537.1MB
MD58764e6596322457d4611b289e5f36554
SHA1259e6c357ebf44dd776bc05a59e91e2622b3cd1f
SHA256b7b747cd4b9900666086e5dae8460a49a7c8a317676d3e3bec285cf7f5322bf3
SHA512a78826f9a3f3b399d89939622dabd13b34f1e6eaa297565b04f98cfdcc14c793de74535c38a42d012c7a7114acb6d7fab932e5a6eb760a24d511d677ddbcff2b