Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2023, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
05e2114cd803d1exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
05e2114cd803d1exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
05e2114cd803d1exe_JC.exe
-
Size
462KB
-
MD5
05e2114cd803d17773b8349e013cc743
-
SHA1
7deb8953b952715f6b3f56f9759aa83a36723eb5
-
SHA256
5b4bfe9205f8f22a4e08846021f2e3c77835b464d5cf2070abca39158c5468f9
-
SHA512
879005c2db98e56dac7be9f901bf609d919266c53032a2cb0060158c1a9799f8f9b9c399852e66fbc3575aa0bbaa0ed51a2e9865fbb2d915ef2f7040f04f7e6c
-
SSDEEP
12288:zJrIik3VcApwH2l8IACW+B+KYN7k0CB3hTYM9:zJrU3VlpwquFrKSo0Cj5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation 920E.tmp -
Executes dropped EXE 1 IoCs
pid Process 1244 920E.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings 920E.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1984 WINWORD.EXE 1984 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1244 920E.tmp -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1984 WINWORD.EXE 1984 WINWORD.EXE 1984 WINWORD.EXE 1984 WINWORD.EXE 1984 WINWORD.EXE 1984 WINWORD.EXE 1984 WINWORD.EXE 1984 WINWORD.EXE 1984 WINWORD.EXE 1984 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4544 wrote to memory of 1244 4544 05e2114cd803d1exe_JC.exe 83 PID 4544 wrote to memory of 1244 4544 05e2114cd803d1exe_JC.exe 83 PID 4544 wrote to memory of 1244 4544 05e2114cd803d1exe_JC.exe 83 PID 1244 wrote to memory of 1984 1244 920E.tmp 87 PID 1244 wrote to memory of 1984 1244 920E.tmp 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e2114cd803d1exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\05e2114cd803d1exe_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\920E.tmp"C:\Users\Admin\AppData\Local\Temp\920E.tmp" --helpC:\Users\Admin\AppData\Local\Temp\05e2114cd803d1exe_JC.exe 3A809C77D6300D5BE789EA21D58E85992A9CC20E97AF94475CFC59F4E53D5FBAB06FC1FEB7BB008BE6C4B0FF1D707792BAAAADE48C6AA4D35B8CAAB290815FB12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\05e2114cd803d1exe_JC.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a
-
Filesize
462KB
MD5b4e6c7580d056e8f58d1380938e8317c
SHA10cf4cd2def00fe6fa1a9db892b90596c3a66a960
SHA2569926b12bef59f68b87ffb04e5b984b2925d428d71b047d84701c4cb0819fb6fd
SHA512e303f41c14d8239d6c5348fbe16da4cb62abe60e4c18f9893992439ba91abd329c8bfaa7dbf56641092642e87fbb68487f8d05929dd9fbc0e4a81dfff7814327
-
Filesize
462KB
MD5b4e6c7580d056e8f58d1380938e8317c
SHA10cf4cd2def00fe6fa1a9db892b90596c3a66a960
SHA2569926b12bef59f68b87ffb04e5b984b2925d428d71b047d84701c4cb0819fb6fd
SHA512e303f41c14d8239d6c5348fbe16da4cb62abe60e4c18f9893992439ba91abd329c8bfaa7dbf56641092642e87fbb68487f8d05929dd9fbc0e4a81dfff7814327