Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2024, 21:58

General

  • Target

    70a99e06e1b75935dd0d14c5281e6291.exe

  • Size

    460KB

  • MD5

    70a99e06e1b75935dd0d14c5281e6291

  • SHA1

    8749e19f91669ce87998b7d74e73336deaa1e47d

  • SHA256

    77e591b08fd1171d2f3f8f653306be30a1d1532681a9d0548bd345b8b5282916

  • SHA512

    daefd406334d238630688bc12fd9a5334b344224d8acaee2e3bc7a346a00160af3d54bff659f835e470783127d7a52d895149cc983d8e21fea959339bbe14d61

  • SSDEEP

    6144:0A4psmawWIrFUJe5X8bbU1oZXPzHRtLnRTHawml5il9uuWzGzFmV+IzlsHZ:0oJe5X8b7Z/zxtLndawsspWyz6I5

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70a99e06e1b75935dd0d14c5281e6291.exe
    "C:\Users\Admin\AppData\Local\Temp\70a99e06e1b75935dd0d14c5281e6291.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\4CD8.tmp
      "C:\Users\Admin\AppData\Local\Temp\4CD8.tmp" --helpC:\Users\Admin\AppData\Local\Temp\70a99e06e1b75935dd0d14c5281e6291.exe DFA94D58621B8C7D059BA44A7C6EEF52BF7D14C7FB1BDED734254837837AD181B2D4690FD5E914749C1BFFDCD3CA95F544DA386DF6C30F452CCD4812F2F8B5C8
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\70a99e06e1b75935dd0d14c5281e6291.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4476

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\4CD8.tmp

          Filesize

          460KB

          MD5

          4a2cb87727675e813ac325e3086afff2

          SHA1

          0d41c6b7cfd6976e581e0c61cd84bdccf4613abe

          SHA256

          0904cebb2c05c59b2e9f4eb0809a514174bc440cb0241c182d1224f85852e603

          SHA512

          fe7765f8ebf0e0f5115980634a233148c982f7950d4202a0831dcc4c54a7688836b588189242cca75bd44837f2ad1519c5092cc52db8a0b93bbe1af4e3f0728f

        • C:\Users\Admin\AppData\Local\Temp\70a99e06e1b75935dd0d14c5281e6291.docx

          Filesize

          21KB

          MD5

          7079891932a64f097abafd233055a1e9

          SHA1

          246d95feafe67689d49a5a4cadba18d3ac1914e5

          SHA256

          c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1

          SHA512

          6e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a

        • memory/4476-9-0x00007FFB26430000-0x00007FFB26440000-memory.dmp

          Filesize

          64KB

        • memory/4476-10-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-12-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-13-0x00007FFB26430000-0x00007FFB26440000-memory.dmp

          Filesize

          64KB

        • memory/4476-14-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-17-0x00007FFB26430000-0x00007FFB26440000-memory.dmp

          Filesize

          64KB

        • memory/4476-16-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-15-0x00007FFB26430000-0x00007FFB26440000-memory.dmp

          Filesize

          64KB

        • memory/4476-18-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-11-0x00007FFB26430000-0x00007FFB26440000-memory.dmp

          Filesize

          64KB

        • memory/4476-20-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-22-0x00007FFB23AD0000-0x00007FFB23AE0000-memory.dmp

          Filesize

          64KB

        • memory/4476-21-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-19-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-23-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-24-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-25-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-26-0x00007FFB23AD0000-0x00007FFB23AE0000-memory.dmp

          Filesize

          64KB

        • memory/4476-27-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-30-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-29-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-28-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-43-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB

        • memory/4476-44-0x00007FFB663B0000-0x00007FFB665A5000-memory.dmp

          Filesize

          2.0MB