Analysis

  • max time kernel
    167s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-02-2024 17:24

General

  • Target

    a45c180893d07ad8b8bac4f89e3ffcda.exe

  • Size

    2.0MB

  • MD5

    a45c180893d07ad8b8bac4f89e3ffcda

  • SHA1

    96289ac5daa11a54be812f1324a343c33580430e

  • SHA256

    58b50486698b3f166fb5aaf9ce08dc2f05a2732e8263507b8dcea62034ca6230

  • SHA512

    852b6a529f3740295412a1507955bf13b7b422d122b43f3f3b4c1d497eda65cc43483da6de8433789bd079139c1c0aa47203bb684b477737a518b239d601c472

  • SSDEEP

    49152:OFUcx88PWPOpX0SFDBCyLk8rc/+bPQRW5pAEyGc:O+K88uPCHtiT/+bouAEyGc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.exe
    "C:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Users\Admin\AppData\Local\Temp\D958.tmp
      "C:\Users\Admin\AppData\Local\Temp\D958.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.exe 9F230F461AB59E724CACDD1E74DEB625267CC8AB66ACCC86FFD3640A6341828346E42576B244C5A56E65561392A6C7016BC99C9B960387D03FD6295D53B7C0EC
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:1428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\D958.tmp

    Filesize

    1.2MB

    MD5

    57be250b98fb12f7ce1fcc55e03ce15b

    SHA1

    2bd027d82482c0645cd01931f5ffcd5e0a0bdbee

    SHA256

    aae0ea3b4ff75298d12581c1882a7e5f13ced74b79af89da0c5627070906f6c4

    SHA512

    dbf10e5fa205779ef5ddda21077eb5b1586746ba4be5b8461771c5e0c134b531149a4df1bc796c8ffcce30a4647b36c1242749a15641770a3bc63db909d3a0c5

  • C:\Users\Admin\AppData\Local\Temp\D958.tmp

    Filesize

    1.4MB

    MD5

    49d62f0658b7469eff8f94d85656c8a3

    SHA1

    541cba970f32486061c17f456280d172768b3e11

    SHA256

    43a4f7e872a794f27c33ca1fc217694b4a7636bf23cc66c469d8adb2c854b6c0

    SHA512

    c8a299b237c0b8e63b77e21c0f4daa0991b25f5d817b7d36bfee2d05f3f01dee789076e0aac990293f67be37e94b75d1648102c1fd368a7392faced9e5468694

  • C:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • memory/1428-20-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-22-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-11-0x00007FFCF8A30000-0x00007FFCF8A40000-memory.dmp

    Filesize

    64KB

  • memory/1428-13-0x00007FFCF8A30000-0x00007FFCF8A40000-memory.dmp

    Filesize

    64KB

  • memory/1428-14-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-15-0x00007FFCF8A30000-0x00007FFCF8A40000-memory.dmp

    Filesize

    64KB

  • memory/1428-16-0x00007FFCF8A30000-0x00007FFCF8A40000-memory.dmp

    Filesize

    64KB

  • memory/1428-17-0x00007FFCF8A30000-0x00007FFCF8A40000-memory.dmp

    Filesize

    64KB

  • memory/1428-12-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-18-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-19-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-44-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-21-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-34-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-24-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-23-0x00007FFCF61D0000-0x00007FFCF61E0000-memory.dmp

    Filesize

    64KB

  • memory/1428-25-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-26-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-27-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-28-0x00007FFCF61D0000-0x00007FFCF61E0000-memory.dmp

    Filesize

    64KB

  • memory/1428-29-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-30-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-31-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-32-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1428-33-0x00007FFD389B0000-0x00007FFD38BA5000-memory.dmp

    Filesize

    2.0MB

  • memory/1548-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2044-5-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB