Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2023 19:54

General

  • Target

    c05c01fd318b74exeexeexeex.exe

  • Size

    467KB

  • MD5

    c05c01fd318b741f8b17cd6b91d471c8

  • SHA1

    e6ea6ea94fd1ce09d8538386c3d8c7db81857906

  • SHA256

    b94c2f056b77094f19068a7ecc1c59a428b0d6505f8e65f9d8172ebc4e7669c3

  • SHA512

    2013e8c04c648b3476e4fec6fbbe143f035a1a1e3ff0ea374ee9e5c2f777bed039ae120a3be6621f184924a57c6ba057078b81683cb7ab18b35ecd178683ff57

  • SSDEEP

    6144:jFrJxvldL4c5ONK1xgWbd1s79+iSt7KxMgz6Nf3DQB+in9SLeP3QVD0ZKHKrpSGo:Bb4bZudi79LeKxTmrQBzusYDpKZ6Ak

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c05c01fd318b74exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\c05c01fd318b74exeexeexeex.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Users\Admin\AppData\Local\Temp\7678.tmp
      "C:\Users\Admin\AppData\Local\Temp\7678.tmp" --helpC:\Users\Admin\AppData\Local\Temp\c05c01fd318b74exeexeexeex.exe 7C5C19C73950EA667B67860AA2931ED6AE97593704EA868A62003ECC7006DFEEF04593BCC63C4797FA02B24ADBA16A66819810805B78E03FA6381C8573BE5C01
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c05c01fd318b74exeexeexeex.doc" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:3480

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7678.tmp

    Filesize

    467KB

    MD5

    66ddcb336fb48b523570044b4e1a99bc

    SHA1

    55a569ecfd47b8b3e53be71692d19cd733f26fbd

    SHA256

    7e0583f591aff39123d6dee8b944d81c183f96042668e2197968325809eb5c85

    SHA512

    0dfd071162ced34a27792bfba0b883d69bf2693cc67f3c7b38a1d8c824aee664675cd63358008a98726b6553e12e4903c2f41400f3bfadcfc437e19e93dd51d4

  • C:\Users\Admin\AppData\Local\Temp\7678.tmp

    Filesize

    467KB

    MD5

    66ddcb336fb48b523570044b4e1a99bc

    SHA1

    55a569ecfd47b8b3e53be71692d19cd733f26fbd

    SHA256

    7e0583f591aff39123d6dee8b944d81c183f96042668e2197968325809eb5c85

    SHA512

    0dfd071162ced34a27792bfba0b883d69bf2693cc67f3c7b38a1d8c824aee664675cd63358008a98726b6553e12e4903c2f41400f3bfadcfc437e19e93dd51d4

  • C:\Users\Admin\AppData\Local\Temp\c05c01fd318b74exeexeexeex.doc

    Filesize

    35KB

    MD5

    a6b03fc9e5439b7504ba08010a960962

    SHA1

    e93a74f35ac1ed020158642eb1f2087fd31fc7c6

    SHA256

    b3b306a9618a08a003443e00e8ce2fcb14040775c3aeadc11cf120668e98dff1

    SHA512

    decbe4fa7eec0833a27acbde8b4de099124aa42e551f710fb615e6fc5aa0056ce9e44fc282e4930b1a669a1e012700b2c79cebc8a7b8ee4c66cfc29c800cddd0

  • C:\Users\Admin\AppData\Local\Temp\c05c01fd318b74exeexeexeex.doc

    Filesize

    35KB

    MD5

    a6b03fc9e5439b7504ba08010a960962

    SHA1

    e93a74f35ac1ed020158642eb1f2087fd31fc7c6

    SHA256

    b3b306a9618a08a003443e00e8ce2fcb14040775c3aeadc11cf120668e98dff1

    SHA512

    decbe4fa7eec0833a27acbde8b4de099124aa42e551f710fb615e6fc5aa0056ce9e44fc282e4930b1a669a1e012700b2c79cebc8a7b8ee4c66cfc29c800cddd0

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/3480-151-0x00007FFE4D7D0000-0x00007FFE4D7E0000-memory.dmp

    Filesize

    64KB

  • memory/3480-150-0x00007FFE4F8F0000-0x00007FFE4F900000-memory.dmp

    Filesize

    64KB

  • memory/3480-149-0x00007FFE4F8F0000-0x00007FFE4F900000-memory.dmp

    Filesize

    64KB

  • memory/3480-147-0x00007FFE4F8F0000-0x00007FFE4F900000-memory.dmp

    Filesize

    64KB

  • memory/3480-152-0x00007FFE4D7D0000-0x00007FFE4D7E0000-memory.dmp

    Filesize

    64KB

  • memory/3480-148-0x00007FFE4F8F0000-0x00007FFE4F900000-memory.dmp

    Filesize

    64KB

  • memory/3480-146-0x00007FFE4F8F0000-0x00007FFE4F900000-memory.dmp

    Filesize

    64KB

  • memory/3480-187-0x00007FFE4F8F0000-0x00007FFE4F900000-memory.dmp

    Filesize

    64KB

  • memory/3480-188-0x00007FFE4F8F0000-0x00007FFE4F900000-memory.dmp

    Filesize

    64KB

  • memory/3480-189-0x00007FFE4F8F0000-0x00007FFE4F900000-memory.dmp

    Filesize

    64KB

  • memory/3480-190-0x00007FFE4F8F0000-0x00007FFE4F900000-memory.dmp

    Filesize

    64KB