Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
76fdcb24b24489702ff6c9c1c7582d8d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76fdcb24b24489702ff6c9c1c7582d8d.exe
Resource
win10v2004-20231215-en
General
-
Target
76fdcb24b24489702ff6c9c1c7582d8d.exe
-
Size
362KB
-
MD5
76fdcb24b24489702ff6c9c1c7582d8d
-
SHA1
b0916647fc667b5c1cf118aefa62ef1a725823da
-
SHA256
defaac6fa8810ec324137563a7a53d604f4c83de4da75b8ad135c1c387c2e653
-
SHA512
f0d24f988a57f2d919047599e73aee4a06ea750c84c4cf5905ef307b659aa135f5f51a07e6850f09a80c69935be4aafe7d3a8a71961a003b030bb5f80860e157
-
SSDEEP
6144:mF7O2oGjzkkL8XZaFW0S3xiKQEf9kX7jcC7mOJDtG6t:EO2oGFgXZaF6YKZVk/c5O
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 76fdcb24b24489702ff6c9c1c7582d8d.exe -
Executes dropped EXE 1 IoCs
pid Process 1312 SmartClock.exe -
Loads dropped DLL 3 IoCs
pid Process 1340 76fdcb24b24489702ff6c9c1c7582d8d.exe 1340 76fdcb24b24489702ff6c9c1c7582d8d.exe 1340 76fdcb24b24489702ff6c9c1c7582d8d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1312 SmartClock.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1312 1340 76fdcb24b24489702ff6c9c1c7582d8d.exe 28 PID 1340 wrote to memory of 1312 1340 76fdcb24b24489702ff6c9c1c7582d8d.exe 28 PID 1340 wrote to memory of 1312 1340 76fdcb24b24489702ff6c9c1c7582d8d.exe 28 PID 1340 wrote to memory of 1312 1340 76fdcb24b24489702ff6c9c1c7582d8d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\76fdcb24b24489702ff6c9c1c7582d8d.exe"C:\Users\Admin\AppData\Local\Temp\76fdcb24b24489702ff6c9c1c7582d8d.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:1312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362KB
MD576fdcb24b24489702ff6c9c1c7582d8d
SHA1b0916647fc667b5c1cf118aefa62ef1a725823da
SHA256defaac6fa8810ec324137563a7a53d604f4c83de4da75b8ad135c1c387c2e653
SHA512f0d24f988a57f2d919047599e73aee4a06ea750c84c4cf5905ef307b659aa135f5f51a07e6850f09a80c69935be4aafe7d3a8a71961a003b030bb5f80860e157