Analysis
-
max time kernel
168s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
document1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
document1.exe
Resource
win10v2004-20230915-en
General
-
Target
document1.exe
-
Size
400.0MB
-
MD5
910f1487d983f7852948765edb527952
-
SHA1
481f0fd4ba70f3d8ff0aade90805ed1ecd8d9571
-
SHA256
d104644bef2cb054832ca683d47b1a975a4cb82fde249c3f4afc0b36dff2e81a
-
SHA512
5d2071d0652c53413d5ccb8d778fbbc7e73faa19ba7699c474cd684a5e39a0047fa3bbfbba08441e98a2e8c7818c11dd5f6efb7a119fa3d16301279829a1cc9a
-
SSDEEP
12288:L1llcJM1rRhQTN64LOfJDHBMYyLOCxatsaR:L1llkMvSNzEZhMYSOCxa2G
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation document1.exe -
Executes dropped EXE 2 IoCs
pid Process 1380 RedLineClipperStub.exe 1528 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\server\\server.exe" document1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4564 set thread context of 1968 4564 document1.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4604 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1968 document1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1968 document1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1968 document1.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1968 4564 document1.exe 97 PID 4564 wrote to memory of 1968 4564 document1.exe 97 PID 4564 wrote to memory of 1968 4564 document1.exe 97 PID 4564 wrote to memory of 1968 4564 document1.exe 97 PID 4564 wrote to memory of 1968 4564 document1.exe 97 PID 4564 wrote to memory of 1968 4564 document1.exe 97 PID 4564 wrote to memory of 1968 4564 document1.exe 97 PID 4564 wrote to memory of 1968 4564 document1.exe 97 PID 4564 wrote to memory of 1380 4564 document1.exe 98 PID 4564 wrote to memory of 1380 4564 document1.exe 98 PID 4564 wrote to memory of 1380 4564 document1.exe 98 PID 4564 wrote to memory of 4112 4564 document1.exe 100 PID 4564 wrote to memory of 4112 4564 document1.exe 100 PID 4564 wrote to memory of 4112 4564 document1.exe 100 PID 4564 wrote to memory of 3572 4564 document1.exe 99 PID 4564 wrote to memory of 3572 4564 document1.exe 99 PID 4564 wrote to memory of 3572 4564 document1.exe 99 PID 4564 wrote to memory of 4744 4564 document1.exe 101 PID 4564 wrote to memory of 4744 4564 document1.exe 101 PID 4564 wrote to memory of 4744 4564 document1.exe 101 PID 3572 wrote to memory of 4604 3572 cmd.exe 105 PID 3572 wrote to memory of 4604 3572 cmd.exe 105 PID 3572 wrote to memory of 4604 3572 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\document1.exe"C:\Users\Admin\AppData\Local\Temp\document1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\document1.exe"C:\Users\Admin\AppData\Local\Temp\document1.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\RedLineClipperStub.exe"C:\Users\Admin\AppData\Local\Temp\RedLineClipperStub.exe"2⤵
- Executes dropped EXE
PID:1380
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\svchost\svchost.exe'" /f3⤵
- Creates scheduled task(s)
PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\svchost"2⤵PID:4112
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\document1.exe" "C:\Users\Admin\AppData\Roaming\svchost\svchost.exe"2⤵PID:4744
-
-
C:\Users\Admin\AppData\Roaming\svchost\svchost.exeC:\Users\Admin\AppData\Roaming\svchost\svchost.exe1⤵
- Executes dropped EXE
PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD56741d00c206f685140fd9cd0957aaaa8
SHA18e2da1453a6001aef807661db6940b1703846890
SHA2568c21274f725299022fbf415925210da65702198913c4713dfe5dda09ceb2d38a
SHA5129ea9656b2a54d7f3482d4625d52aa0c51e788ece799de5bb35e821efe138cce49e0d091e4ba683ef49d727d01ff9b912f58f5a96dac3f57441709318c364f527
-
Filesize
76KB
MD56741d00c206f685140fd9cd0957aaaa8
SHA18e2da1453a6001aef807661db6940b1703846890
SHA2568c21274f725299022fbf415925210da65702198913c4713dfe5dda09ceb2d38a
SHA5129ea9656b2a54d7f3482d4625d52aa0c51e788ece799de5bb35e821efe138cce49e0d091e4ba683ef49d727d01ff9b912f58f5a96dac3f57441709318c364f527
-
Filesize
76KB
MD56741d00c206f685140fd9cd0957aaaa8
SHA18e2da1453a6001aef807661db6940b1703846890
SHA2568c21274f725299022fbf415925210da65702198913c4713dfe5dda09ceb2d38a
SHA5129ea9656b2a54d7f3482d4625d52aa0c51e788ece799de5bb35e821efe138cce49e0d091e4ba683ef49d727d01ff9b912f58f5a96dac3f57441709318c364f527
-
Filesize
400.0MB
MD5910f1487d983f7852948765edb527952
SHA1481f0fd4ba70f3d8ff0aade90805ed1ecd8d9571
SHA256d104644bef2cb054832ca683d47b1a975a4cb82fde249c3f4afc0b36dff2e81a
SHA5125d2071d0652c53413d5ccb8d778fbbc7e73faa19ba7699c474cd684a5e39a0047fa3bbfbba08441e98a2e8c7818c11dd5f6efb7a119fa3d16301279829a1cc9a
-
Filesize
400.0MB
MD5910f1487d983f7852948765edb527952
SHA1481f0fd4ba70f3d8ff0aade90805ed1ecd8d9571
SHA256d104644bef2cb054832ca683d47b1a975a4cb82fde249c3f4afc0b36dff2e81a
SHA5125d2071d0652c53413d5ccb8d778fbbc7e73faa19ba7699c474cd684a5e39a0047fa3bbfbba08441e98a2e8c7818c11dd5f6efb7a119fa3d16301279829a1cc9a