Overview
overview
8Static
static
37e68febfb5...2f.exe
windows7-x64
87e68febfb5...2f.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.dll
windows7-x64
1$PROGRAMFI...it.dll
windows10-2004-x64
1$PROGRAMFI...ge.dll
windows7-x64
1$PROGRAMFI...ge.dll
windows10-2004-x64
1$PROGRAMFI...er.dll
windows7-x64
1$PROGRAMFI...er.dll
windows10-2004-x64
14.exe
windows7-x64
74.exe
windows10-2004-x64
7vpn.exe
windows7-x64
8vpn.exe
windows10-2004-x64
8Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
7e68febfb5892c836dc420c3dc235b2f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e68febfb5892c836dc420c3dc235b2f.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
4.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
4.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
vpn.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
vpn.exe
Resource
win10v2004-20231222-en
General
-
Target
4.exe
-
Size
347KB
-
MD5
c62f196e112e10db42a7461278ebb0bb
-
SHA1
4b1c2cf08e803785d4993d994eb739b93cc9762b
-
SHA256
303c65699df8994263b0d2f6243e09ea6ffb3c6b80dab3e075fc1957274824f5
-
SHA512
cdb3745d04df77bd4155523945a51bb570d433a21e5a6036252a8cb41139ca148c41f187053f546ed76632ba8630d14a7e143221875b2f36e92e553590f91f5a
-
SSDEEP
6144:BMN4LD/6Bx/+yupT146xSqK6QdGN0EoUgWSVM5t3ddUq:hLb6Bx/+tpTrxSqK63sUgx25Dd
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 SmartClock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 568 5080 WerFault.exe 83 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2748 SmartClock.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5080 wrote to memory of 2748 5080 4.exe 84 PID 5080 wrote to memory of 2748 5080 4.exe 84 PID 5080 wrote to memory of 2748 5080 4.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 9922⤵
- Program crash
PID:568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5080 -ip 50801⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5c62f196e112e10db42a7461278ebb0bb
SHA14b1c2cf08e803785d4993d994eb739b93cc9762b
SHA256303c65699df8994263b0d2f6243e09ea6ffb3c6b80dab3e075fc1957274824f5
SHA512cdb3745d04df77bd4155523945a51bb570d433a21e5a6036252a8cb41139ca148c41f187053f546ed76632ba8630d14a7e143221875b2f36e92e553590f91f5a