Analysis
-
max time kernel
144s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
4522d9fd935a0d761ec008b33eb734ea.exe
Resource
win7-20231129-en
General
-
Target
4522d9fd935a0d761ec008b33eb734ea.exe
-
Size
471KB
-
MD5
4522d9fd935a0d761ec008b33eb734ea
-
SHA1
55c028531e48f1fd9de7c41c9dbfd50eeec27007
-
SHA256
cfe1f58f8f8ec9bebb9ae59206340e6cb0b134a33dc8799a726186b0812eef40
-
SHA512
75b4f0bb2664f3f413aacf9072531367a021f29bb8562dce250830dfbf285fb4d5d801c027b7d557bb6dacc84ca69e20035141e4f90533315541cc7a51250faa
-
SSDEEP
12288:yQ2FiaReVSB5h20NmGA8/E9VYLNiPuV/m:yQ2Fia6yjN1VYVYLgP
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 129528315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "5" 129528315.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 4522d9fd935a0d761ec008b33eb734ea.exe -
Executes dropped EXE 3 IoCs
pid Process 228 107171398.exe 4268 129528315.exe 3192 190211240.bin -
Loads dropped DLL 1 IoCs
pid Process 764 regsvr32.exe -
resource yara_rule behavioral2/files/0x000800000002314d-29.dat upx behavioral2/memory/3192-31-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral2/files/0x000800000002314d-30.dat upx behavioral2/memory/3192-32-0x0000000000400000-0x000000000046E000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{069C4A2C-54E9-56AF-706B-08091FA26E78} regsvr32.exe -
An obfuscated cmd.exe command-line is typically used to evade detection. 4 IoCs
pid Process 3940 cmd.exe 4684 cmd.exe 2964 cmd.exe 528 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mfmkvsrccsnk.dll 129528315.exe File created C:\Windows\SysWOW64\clipp.exe 129528315.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Registration\DigitalProductSubId = e95400002c4a000009080000af560000786e00009c060000a21f00006b700000 regsvr32.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78}\MiscStatus\u1 = 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 regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78}\MiscStatus\st = 59b0936503000000 regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78}\MiscStatus\ID = "7" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78}\ = "Groove Folder Synchronization" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78}\MiscStatus regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78}\MiscStatus\ = "10742" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78}\MiscStatus\u0 = "©¶·´\x7fuv€|x\u0081…{€\u0081„\x7fˆ‹ƒ¸ŽŠ\u008f\u008f¿‹œƒÒ" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78}\InProcServer32\ = "C:\\Windows\\SysWow64\\mfmkvsrccsnk.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{069C4A2C-54E9-56AF-706B-08091FA26E78}\MiscStatus\ut = "1704174153" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin 3192 190211240.bin -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3192 190211240.bin -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3192 190211240.bin -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3720 2096 4522d9fd935a0d761ec008b33eb734ea.exe 93 PID 2096 wrote to memory of 3720 2096 4522d9fd935a0d761ec008b33eb734ea.exe 93 PID 2096 wrote to memory of 3720 2096 4522d9fd935a0d761ec008b33eb734ea.exe 93 PID 3720 wrote to memory of 228 3720 4522d9fd935a0d761ec008b33eb734ea.exe 91 PID 3720 wrote to memory of 228 3720 4522d9fd935a0d761ec008b33eb734ea.exe 91 PID 3720 wrote to memory of 228 3720 4522d9fd935a0d761ec008b33eb734ea.exe 91 PID 3720 wrote to memory of 4268 3720 4522d9fd935a0d761ec008b33eb734ea.exe 94 PID 3720 wrote to memory of 4268 3720 4522d9fd935a0d761ec008b33eb734ea.exe 94 PID 3720 wrote to memory of 4268 3720 4522d9fd935a0d761ec008b33eb734ea.exe 94 PID 4268 wrote to memory of 764 4268 129528315.exe 112 PID 4268 wrote to memory of 764 4268 129528315.exe 112 PID 4268 wrote to memory of 764 4268 129528315.exe 112 PID 4268 wrote to memory of 528 4268 129528315.exe 111 PID 4268 wrote to memory of 528 4268 129528315.exe 111 PID 4268 wrote to memory of 528 4268 129528315.exe 111 PID 4268 wrote to memory of 2964 4268 129528315.exe 101 PID 4268 wrote to memory of 2964 4268 129528315.exe 101 PID 4268 wrote to memory of 2964 4268 129528315.exe 101 PID 4268 wrote to memory of 4684 4268 129528315.exe 100 PID 4268 wrote to memory of 4684 4268 129528315.exe 100 PID 4268 wrote to memory of 4684 4268 129528315.exe 100 PID 4268 wrote to memory of 3940 4268 129528315.exe 99 PID 4268 wrote to memory of 3940 4268 129528315.exe 99 PID 4268 wrote to memory of 3940 4268 129528315.exe 99 PID 2964 wrote to memory of 3428 2964 cmd.exe 105 PID 2964 wrote to memory of 3428 2964 cmd.exe 105 PID 2964 wrote to memory of 3428 2964 cmd.exe 105 PID 3940 wrote to memory of 1056 3940 cmd.exe 104 PID 3940 wrote to memory of 1056 3940 cmd.exe 104 PID 3940 wrote to memory of 1056 3940 cmd.exe 104 PID 528 wrote to memory of 2796 528 cmd.exe 106 PID 528 wrote to memory of 2796 528 cmd.exe 106 PID 528 wrote to memory of 2796 528 cmd.exe 106 PID 4684 wrote to memory of 4912 4684 cmd.exe 103 PID 4684 wrote to memory of 4912 4684 cmd.exe 103 PID 4684 wrote to memory of 4912 4684 cmd.exe 103 PID 3720 wrote to memory of 3192 3720 4522d9fd935a0d761ec008b33eb734ea.exe 113 PID 3720 wrote to memory of 3192 3720 4522d9fd935a0d761ec008b33eb734ea.exe 113 PID 3720 wrote to memory of 3192 3720 4522d9fd935a0d761ec008b33eb734ea.exe 113 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 129528315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 129528315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "5" 129528315.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4522d9fd935a0d761ec008b33eb734ea.exe"C:\Users\Admin\AppData\Local\Temp\4522d9fd935a0d761ec008b33eb734ea.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\4522d9fd935a0d761ec008b33eb734ea.exe"C:\Users\Admin\AppData\Local\Temp\4522d9fd935a0d761ec008b33eb734ea.exe" "runas"2⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\129528315.exe"C:\Users\Admin\AppData\Local\Temp\129528315.exe" "C:\Users\Admin\AppData\Local\Temp\1555024821.bin"3⤵
- UAC bypass
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c at 17:21 /every:1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 "C:\Windows\system32\clipp.exe"4⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\at.exeat 17:21 /every:1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 "C:\Windows\system32\clipp.exe"5⤵PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c at 23:52 /every:1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 "C:\Windows\system32\clipp.exe"4⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\at.exeat 23:52 /every:1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 "C:\Windows\system32\clipp.exe"5⤵PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c at 11:02 /every:1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 "C:\Windows\system32\clipp.exe"4⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\at.exeat 11:02 /every:1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 "C:\Windows\system32\clipp.exe"5⤵PID:3428
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c at 05:21 /every:1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 "C:\Windows\system32\clipp.exe"4⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:528
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\mfmkvsrccsnk.dll"4⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:764
-
-
-
C:\Users\Admin\AppData\Local\Temp\190211240.bin"C:\Users\Admin\AppData\Local\Temp\190211240.bin"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\107171398.exe"C:\Users\Admin\AppData\Local\Temp\107171398.exe" "C:\Users\Admin\AppData\Local\Temp\1555024821.bin"1⤵
- Executes dropped EXE
PID:228
-
C:\Windows\SysWOW64\at.exeat 05:21 /every:1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 "C:\Windows\system32\clipp.exe"1⤵PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD532670744c6b48a55a156e348e4815d63
SHA150dab245554733c4c1cb8551e1bec063cac432e1
SHA256a97b4043f52f78d4f4f0bd10295b2d609530d959a11b4e7337a471cc72bedf39
SHA5129253c461313816145eae8918e6d37fc34250714ea610d2783a2733ea0ea57246c23e1e8ba107ff1650b873acf368edc4567b928cedfb1d25cd5f23763d7ec286
-
Filesize
402B
MD5ca86c94cf9256cd2bf93e6639c32f61c
SHA1371bad2dac6afaef6fa2311fdd16631e80c8c905
SHA2561cd69c1dd920606cd6e3c42d6bff4f63e6d02a99edb6b3604ee6f182ff1374df
SHA51214ace75dfa50b6dc5e51cef80981630c2177b3ea3ef8892c7938e0b91a325fc09d95bbcad2a841c8eaf156d9c418de64ad458344eb795ee6dcd7707f8423d2a9
-
Filesize
243KB
MD597bacf4e79415c1bd1afa578eefb2e35
SHA1f7ae523b22e44106e4be136098f367614fd6061f
SHA256b7488daa93b04130e29a35ac6c6445fdd6f240824a6b98ab76d2c87e9bdabc52
SHA512a6524e2d74ab97e8158ed3457ba3481f70278ae7cba5ea861f59c60acd5dba4e3177124ebade52e94ca9f0d85d0a3d5c6b249f3b287d543645b4e4ad75142303
-
Filesize
93KB
MD56cbe856f910a24cda424ee673029559f
SHA1cda0d4e353f196d079e98d0816c0602f5dc018a6
SHA256a79c9c7a043fdd5a907428658fdac0f1cda50262a77c68c6fa75455f947388e4
SHA512426ae1671898f3558f5fc37ce290b078b05d9a02fb2177850078a430976d0ae8a7e2272b272debba8aeeca97ee3c2b889117e766ab8e06b9aa770ead170418a1
-
Filesize
176KB
MD58bf7b7689cc8b5b1e51bd06c35abd849
SHA14f2b8500da81453450d7cf6b19a72c9b121d7295
SHA256d1721d05ac716373230f3044828a5d400c0884a62b7867d63f965a57bb414882
SHA51271cf5cc2740a29df0f63cda56421356ebc49906516cb4776f81b292a9c0489a58b7589a946d317bc78d62dceb1b038b6bd70a0fb47b26cf5a1ffae1bade5c0ab