Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
ClickOnceTest.exe
Resource
win7-20231020-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
ClickOnceTest.exe
Resource
win10v2004-20231025-en
5 signatures
150 seconds
General
-
Target
ClickOnceTest.exe
-
Size
12KB
-
MD5
6527b808f2414e30fff25b5e307a05c5
-
SHA1
0f23a3b3078a4d4cd48256ae372039dfc42192fb
-
SHA256
90d5203692e216438a10f1d810ca3d89a8baadb75d78437b8fbace580c983a82
-
SHA512
66caa9e4045aaeecf581eeefde8bc7e6f9f58dd42fc5457a8db2e01327d1e92d41eb4d3192127e23df3c2f982c6a17a6b39651cd9ca4ce953c2a5b427f352c57
-
SSDEEP
192:s6gqVc6w1DWpHkj23HGPDtyA5K+o/y2sE9jBF0Ny6aLc:7vVk1DGE0ktyAM+o/8E9VF0NytLc
Score
5/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation ClickOnceTest.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000_Classes\Local Settings calc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3560 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2764 wrote to memory of 336 2764 ClickOnceTest.exe 87 PID 2764 wrote to memory of 336 2764 ClickOnceTest.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ClickOnceTest.exe"C:\Users\Admin\AppData\Local\Temp\ClickOnceTest.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\calc.exe"C:\Windows\System32\calc.exe"2⤵
- Modifies registry class
PID:336
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3560