Analysis

  • max time kernel
    301s
  • max time network
    292s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-02-2024 09:44

General

  • Target

    ccc.png

  • Size

    3KB

  • MD5

    acf07972f9c151a7722ed28abf482496

  • SHA1

    e97e1dc624a4de25b82b9beb9c952f8232501b88

  • SHA256

    6bd269ad6c67ef2e2c298fdabd7eaa59acc60df14007de4cf395634a782017eb

  • SHA512

    0b7fad6d1d83c4f187ef7aee4e61248c0b8ce2734a77bb7beae7770d3d30bdf9765f34d7acbb299eb7d46bf5378e486152c290f8ee6a1cbb248e818872396196

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies registry class 58 IoCs
  • Suspicious behavior: AddClipboardFormatListener 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ccc.png
    1⤵
      PID:4788
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
      1⤵
        PID:2472
      • C:\Windows\System32\oobe\UserOOBEBroker.exe
        C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
        1⤵
        • Drops file in Windows directory
        PID:3536
      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
        C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
        1⤵
          PID:4520
        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:3228
        • C:\Windows\system32\AUDIODG.EXE
          C:\Windows\system32\AUDIODG.EXE 0x00000000000004C4 0x00000000000004E4
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3832
        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:4976
        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
          1⤵
            PID:3712
          • C:\Windows\system32\SystemSettingsAdminFlows.exe
            "C:\Windows\system32\SystemSettingsAdminFlows.exe" RenamePC
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:4520
          • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
            "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\Name.docx" /o ""
            1⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of SetWindowsHookEx
            PID:2284
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x0 /state0:0xa3a36855 /state1:0x41c64e6d
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1816

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Microsoft\Windows\SystemData\S-1-5-21-3594324687-1993884830-4019639329-1000\ReadOnly\LockScreen_Z\LockScreen___1280_0720_notdimmed.jpg

            Filesize

            62KB

            MD5

            6cb7e9f13c79d1dd975a8aa005ab0256

            SHA1

            eac7fc28cc13ac1e9c85f828215cd61f0c698ae3

            SHA256

            af2537d470fddbeda270c965b8dbdf7e9ccf480ed2f525012e2f1035112a6d67

            SHA512

            3a40359d8e4cc8792be78a022dc04daed5c1cc55d78fe9cf3e061ea5587baa15023ce2152238f5be5cc5124cd468f220cf9dab54344d93edd3dfcd400b24469d

          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2024-2-22.945.4520.1.odl

            Filesize

            706B

            MD5

            639e9420e4f0f0c4ddde0c6e94bda5f6

            SHA1

            e38feaecd2ab8db6c254568700da255e418d681a

            SHA256

            fa29691084041690baa337760322ae07ac634fd0cf547a8e597c85e3798f74d0

            SHA512

            344d452497edaa60068a573dc2837911bedf9e986015dbc1aa79d02d56abc050783f1b577f4ec922ca7118866478c752b858cf7e0d0ce6cbfe41c6817ce0b03b

          • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Temp\APPX.4xs0v3s38s9msoputosi86tkh.tmp

            Filesize

            2KB

            MD5

            530f1945913c81b38450c5a468428ee6

            SHA1

            0c6d47f5376342002ffdbc9a26ebec22c48dca37

            SHA256

            4112d529734d33abda74478c199f6ddc5098767e69214a00d80f23d2ea7291ff

            SHA512

            3906427ffb8f2dfea76ba9bb8cac6bd7dece3ebee7e94ea92da5bbdb55d8859c41260a2bda4e84fab7e1fb857ad12a2e286694ea64d00d0aa6cab200fbbf64f0

          • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Temp\APPX.90gm75s53tjtb_21lomrcju_h.tmp

            Filesize

            9KB

            MD5

            24ebdb1228a1818eee374bc8794869b7

            SHA1

            79fc3adb42a5d7ee12ff6729ef5f7a81e563cd2d

            SHA256

            92a7d7d3b0bfac458ddcef07afcdad3646653ba7f4ad048fdd7a5ec673235923

            SHA512

            63764d99a0118fac409327d5bf70f2aa9b31caf5277c4bc1e595016a50c524cd6c3d67924321b0fcad12cd968de1a62bd292151e35fd907034efd0f40b743d6a

          • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Temp\APPX._859plikgbq8kjyh6a72cgebh.tmp

            Filesize

            1KB

            MD5

            4085b7b25606706f1a1ad9a88211a9b7

            SHA1

            31019f39a5e0bf2b1aa9fe5dda31856b30e963cc

            SHA256

            b64efcb638291c1e1c132ed5636afbb198031cee44384f3ecf67d82b73accecc

            SHA512

            9537559523839e3e708feabe8c04f40236add7d200ec36bad00c10a69337a15001103c17093dcc0d8cadb4713d911f39a6411624c1db4cbf1ea1af272a716168

          • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

            Filesize

            217B

            MD5

            4d42f5b60adbf8b98bc3271f7afe20ed

            SHA1

            9e28a592f3312e9f02f4454262b985835b688175

            SHA256

            cf380f28369863fb230866e646feaf4083508d319add3847a203f507d82b8178

            SHA512

            bb9f481c6d6b2831c5277843607438d157d05b0c330223eb05c26c8c82dc33a8a6eb66dfedf963844fefb177344fe9e762d32cdc2d8e72ab6210dca643f6be27

          • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

            Filesize

            3KB

            MD5

            917b68b596537239f7203a6e352597ec

            SHA1

            e155eef55a9d28cdea79f6746749d5efae1390e8

            SHA256

            17fdc4eece3607837c5e1d599e4b42d30222bdeb4e408c4ab2c8c17f62905465

            SHA512

            23da857c7eaf52b6c9e7a800a4fd2b9bed0a0eaf69df1f4c18ab65745f8b0aee5fa9adc837b2f00478cc1bbe5fbf1d3604fdc7f1b9a7b8fe2923baa2b8847aa5

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

            Filesize

            3KB

            MD5

            3fc04e3f10f764dfab7c9007475b4116

            SHA1

            213b4db58db3a079980c49b258345d5ba0b655fd

            SHA256

            5c0cfed08baeff57c89ede259c757267c56408418807097ec8d298f2b4a64768

            SHA512

            f5ab403e0038112f06f0c86f93b6badab9ccd967406c01de34af734ef9dd0dfbc15f9e823e07569a146e87c2dc5e126ad382d814d57f93b93a8ff40cfb2af58c

          • memory/2284-60-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-64-0x00007FF917830000-0x00007FF917840000-memory.dmp

            Filesize

            64KB

          • memory/2284-54-0x00007FF919A50000-0x00007FF919A60000-memory.dmp

            Filesize

            64KB

          • memory/2284-56-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-50-0x00007FF919A50000-0x00007FF919A60000-memory.dmp

            Filesize

            64KB

          • memory/2284-57-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-58-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-53-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-59-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-61-0x00007FF917830000-0x00007FF917840000-memory.dmp

            Filesize

            64KB

          • memory/2284-62-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-63-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-65-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-55-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-66-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-68-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-69-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-71-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-72-0x00007FF958500000-0x00007FF9585BD000-memory.dmp

            Filesize

            756KB

          • memory/2284-51-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-52-0x00007FF919A50000-0x00007FF919A60000-memory.dmp

            Filesize

            64KB

          • memory/2284-48-0x00007FF919A50000-0x00007FF919A60000-memory.dmp

            Filesize

            64KB

          • memory/2284-96-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-49-0x00007FF9599C0000-0x00007FF959BC9000-memory.dmp

            Filesize

            2.0MB

          • memory/2284-47-0x00007FF919A50000-0x00007FF919A60000-memory.dmp

            Filesize

            64KB