Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 19:54
Static task
static1
Behavioral task
behavioral1
Sample
c05c01fd318b74exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
c05c01fd318b74exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
c05c01fd318b74exeexeexeex.exe
-
Size
467KB
-
MD5
c05c01fd318b741f8b17cd6b91d471c8
-
SHA1
e6ea6ea94fd1ce09d8538386c3d8c7db81857906
-
SHA256
b94c2f056b77094f19068a7ecc1c59a428b0d6505f8e65f9d8172ebc4e7669c3
-
SHA512
2013e8c04c648b3476e4fec6fbbe143f035a1a1e3ff0ea374ee9e5c2f777bed039ae120a3be6621f184924a57c6ba057078b81683cb7ab18b35ecd178683ff57
-
SSDEEP
6144:jFrJxvldL4c5ONK1xgWbd1s79+iSt7KxMgz6Nf3DQB+in9SLeP3QVD0ZKHKrpSGo:Bb4bZudi79LeKxTmrQBzusYDpKZ6Ak
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation 7678.tmp -
Executes dropped EXE 1 IoCs
pid Process 1976 7678.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings 7678.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3480 WINWORD.EXE 3480 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1976 7678.tmp -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3480 WINWORD.EXE 3480 WINWORD.EXE 3480 WINWORD.EXE 3480 WINWORD.EXE 3480 WINWORD.EXE 3480 WINWORD.EXE 3480 WINWORD.EXE 3480 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3300 wrote to memory of 1976 3300 c05c01fd318b74exeexeexeex.exe 83 PID 3300 wrote to memory of 1976 3300 c05c01fd318b74exeexeexeex.exe 83 PID 3300 wrote to memory of 1976 3300 c05c01fd318b74exeexeexeex.exe 83 PID 1976 wrote to memory of 3480 1976 7678.tmp 85 PID 1976 wrote to memory of 3480 1976 7678.tmp 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c05c01fd318b74exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\c05c01fd318b74exeexeexeex.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\7678.tmp"C:\Users\Admin\AppData\Local\Temp\7678.tmp" --helpC:\Users\Admin\AppData\Local\Temp\c05c01fd318b74exeexeexeex.exe 7C5C19C73950EA667B67860AA2931ED6AE97593704EA868A62003ECC7006DFEEF04593BCC63C4797FA02B24ADBA16A66819810805B78E03FA6381C8573BE5C012⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c05c01fd318b74exeexeexeex.doc" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3480
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
467KB
MD566ddcb336fb48b523570044b4e1a99bc
SHA155a569ecfd47b8b3e53be71692d19cd733f26fbd
SHA2567e0583f591aff39123d6dee8b944d81c183f96042668e2197968325809eb5c85
SHA5120dfd071162ced34a27792bfba0b883d69bf2693cc67f3c7b38a1d8c824aee664675cd63358008a98726b6553e12e4903c2f41400f3bfadcfc437e19e93dd51d4
-
Filesize
467KB
MD566ddcb336fb48b523570044b4e1a99bc
SHA155a569ecfd47b8b3e53be71692d19cd733f26fbd
SHA2567e0583f591aff39123d6dee8b944d81c183f96042668e2197968325809eb5c85
SHA5120dfd071162ced34a27792bfba0b883d69bf2693cc67f3c7b38a1d8c824aee664675cd63358008a98726b6553e12e4903c2f41400f3bfadcfc437e19e93dd51d4
-
Filesize
35KB
MD5a6b03fc9e5439b7504ba08010a960962
SHA1e93a74f35ac1ed020158642eb1f2087fd31fc7c6
SHA256b3b306a9618a08a003443e00e8ce2fcb14040775c3aeadc11cf120668e98dff1
SHA512decbe4fa7eec0833a27acbde8b4de099124aa42e551f710fb615e6fc5aa0056ce9e44fc282e4930b1a669a1e012700b2c79cebc8a7b8ee4c66cfc29c800cddd0
-
Filesize
35KB
MD5a6b03fc9e5439b7504ba08010a960962
SHA1e93a74f35ac1ed020158642eb1f2087fd31fc7c6
SHA256b3b306a9618a08a003443e00e8ce2fcb14040775c3aeadc11cf120668e98dff1
SHA512decbe4fa7eec0833a27acbde8b4de099124aa42e551f710fb615e6fc5aa0056ce9e44fc282e4930b1a669a1e012700b2c79cebc8a7b8ee4c66cfc29c800cddd0
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84