Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
70a99e06e1b75935dd0d14c5281e6291.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70a99e06e1b75935dd0d14c5281e6291.exe
Resource
win10v2004-20231215-en
General
-
Target
70a99e06e1b75935dd0d14c5281e6291.exe
-
Size
460KB
-
MD5
70a99e06e1b75935dd0d14c5281e6291
-
SHA1
8749e19f91669ce87998b7d74e73336deaa1e47d
-
SHA256
77e591b08fd1171d2f3f8f653306be30a1d1532681a9d0548bd345b8b5282916
-
SHA512
daefd406334d238630688bc12fd9a5334b344224d8acaee2e3bc7a346a00160af3d54bff659f835e470783127d7a52d895149cc983d8e21fea959339bbe14d61
-
SSDEEP
6144:0A4psmawWIrFUJe5X8bbU1oZXPzHRtLnRTHawml5il9uuWzGzFmV+IzlsHZ:0oJe5X8b7Z/zxtLndawsspWyz6I5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 4CD8.tmp -
Executes dropped EXE 1 IoCs
pid Process 224 4CD8.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings 4CD8.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4476 WINWORD.EXE 4476 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 224 4CD8.tmp -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4476 WINWORD.EXE 4476 WINWORD.EXE 4476 WINWORD.EXE 4476 WINWORD.EXE 4476 WINWORD.EXE 4476 WINWORD.EXE 4476 WINWORD.EXE 4476 WINWORD.EXE 4476 WINWORD.EXE 4476 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1184 wrote to memory of 224 1184 70a99e06e1b75935dd0d14c5281e6291.exe 85 PID 1184 wrote to memory of 224 1184 70a99e06e1b75935dd0d14c5281e6291.exe 85 PID 1184 wrote to memory of 224 1184 70a99e06e1b75935dd0d14c5281e6291.exe 85 PID 224 wrote to memory of 4476 224 4CD8.tmp 90 PID 224 wrote to memory of 4476 224 4CD8.tmp 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\70a99e06e1b75935dd0d14c5281e6291.exe"C:\Users\Admin\AppData\Local\Temp\70a99e06e1b75935dd0d14c5281e6291.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"C:\Users\Admin\AppData\Local\Temp\4CD8.tmp" --helpC:\Users\Admin\AppData\Local\Temp\70a99e06e1b75935dd0d14c5281e6291.exe DFA94D58621B8C7D059BA44A7C6EEF52BF7D14C7FB1BDED734254837837AD181B2D4690FD5E914749C1BFFDCD3CA95F544DA386DF6C30F452CCD4812F2F8B5C82⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\70a99e06e1b75935dd0d14c5281e6291.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
460KB
MD54a2cb87727675e813ac325e3086afff2
SHA10d41c6b7cfd6976e581e0c61cd84bdccf4613abe
SHA2560904cebb2c05c59b2e9f4eb0809a514174bc440cb0241c182d1224f85852e603
SHA512fe7765f8ebf0e0f5115980634a233148c982f7950d4202a0831dcc4c54a7688836b588189242cca75bd44837f2ad1519c5092cc52db8a0b93bbe1af4e3f0728f
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a