Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2023 16:43
Static task
static1
Behavioral task
behavioral1
Sample
entry_1_0/clipgrab-3.9.7-dotinstaller.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
entry_1_0/clipgrab-3.9.7-dotinstaller.exe
Resource
win10v2004-20231215-en
General
-
Target
entry_1_0/clipgrab-3.9.7-dotinstaller.exe
-
Size
2.8MB
-
MD5
0f29445baa824f6729cbda3d90b15cec
-
SHA1
572195b4193529d842653e678eeec7dc3544ee2f
-
SHA256
f980e92af3341650819ca6c985294ebe0aa78d38bdfe249536d7ec7f2efc6ecf
-
SHA512
a05bb0cb18d3c7e0ce5795397beeaee90078c272afccf5211d911eae4bc39078bed7da22c528e77ed4daea1c1b4e736c2f361cdb6e525e4132ba4793e433cc81
-
SSDEEP
49152:9qe3f6PUk/4g+H98AHaCfu6rtWBu1SSmqOIzDamifOL9T9vEXv:MSiPUk/XE9vBugtL1SNaRLh9vEXv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1852 clipgrab-3.9.7-dotinstaller.tmp -
Loads dropped DLL 3 IoCs
pid Process 1852 clipgrab-3.9.7-dotinstaller.tmp 1852 clipgrab-3.9.7-dotinstaller.tmp 1852 clipgrab-3.9.7-dotinstaller.tmp -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ clipgrab-3.9.7-dotinstaller.tmp Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 clipgrab-3.9.7-dotinstaller.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 21 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1852 clipgrab-3.9.7-dotinstaller.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1852 2120 clipgrab-3.9.7-dotinstaller.exe 88 PID 2120 wrote to memory of 1852 2120 clipgrab-3.9.7-dotinstaller.exe 88 PID 2120 wrote to memory of 1852 2120 clipgrab-3.9.7-dotinstaller.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\entry_1_0\clipgrab-3.9.7-dotinstaller.exe"C:\Users\Admin\AppData\Local\Temp\entry_1_0\clipgrab-3.9.7-dotinstaller.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\is-JUC1K.tmp\clipgrab-3.9.7-dotinstaller.tmp"C:\Users\Admin\AppData\Local\Temp\is-JUC1K.tmp\clipgrab-3.9.7-dotinstaller.tmp" /SL5="$40216,1907617,1111552,C:\Users\Admin\AppData\Local\Temp\entry_1_0\clipgrab-3.9.7-dotinstaller.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:1852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5aadc16c8ad4312196df3aa1d9f6386d3
SHA1ff4d78923e0d957e6a66b3c06efecc435c396c7a
SHA25604fade43204ecbbb378114a023b3db4a3aebe8258ff3b3846156e80a9c5cf4a3
SHA51251621ec71d530d75e4a537381edf03bc48b234dd861547c950573febf5709a1716ee797368854512edf1950a4e1f4f8bbe292417a0dd238600338a39e2454e04
-
Filesize
37KB
MD567965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
Filesize
10KB
MD5f23a523b82ad9103a9ac1dcc33eca72f
SHA15363bb6b51923441ef56638576307cc252f05a71
SHA25659853c413b0813ded6f1e557959768d6662f010f49884d36b62c13038fac739c
SHA512514ec63f7ed80d0708f7e2355fad8a558b4dcf2d0122ff98fe7c3ca1f40e7cd04e8869ca7a3b95622c0848c0d99306d7e791b86ca69b9e240beae959ca6285be
-
Filesize
9KB
MD52c050a55ade91ca10c94c41fdceaa8cb
SHA1178fd0ee1c184fe681d89bff0ff8b89392723a67
SHA25643262c9cc6328d67007b97a8eb36c924d05d45a383349e61b067f35677e1ad6e
SHA512425825cbe2a417f10832c37fc0e571ca3e3f9b940f93f9f8ec8fcff2df896a52ff753386c30e03836d588b6bf355323dbea2e3a0cbf756f8f3c7065335cbfeac
-
Filesize
2.0MB
MD5e1f18a22199c6f6aa5d87b24e5b39ef1
SHA10dcd8f90b575f6f1d10d6789fe769fa26daafd0e
SHA25662c56c8cf2ac6521ce047b73aa99b6d3952ca53f11d34b00e98d17674a2fc10d
SHA5125a10a2f096adce6e7db3a40bc3ea3fd44d602966e606706ee5a780703f211de7f77656c79c296390baee1e008dc3ce327eaaf5d78bbae20108670c5bc809a190