Analysis
-
max time kernel
167s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
a45c180893d07ad8b8bac4f89e3ffcda.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a45c180893d07ad8b8bac4f89e3ffcda.exe
Resource
win10v2004-20240221-en
General
-
Target
a45c180893d07ad8b8bac4f89e3ffcda.exe
-
Size
2.0MB
-
MD5
a45c180893d07ad8b8bac4f89e3ffcda
-
SHA1
96289ac5daa11a54be812f1324a343c33580430e
-
SHA256
58b50486698b3f166fb5aaf9ce08dc2f05a2732e8263507b8dcea62034ca6230
-
SHA512
852b6a529f3740295412a1507955bf13b7b422d122b43f3f3b4c1d497eda65cc43483da6de8433789bd079139c1c0aa47203bb684b477737a518b239d601c472
-
SSDEEP
49152:OFUcx88PWPOpX0SFDBCyLk8rc/+bPQRW5pAEyGc:O+K88uPCHtiT/+bouAEyGc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000\Control Panel\International\Geo\Nation D958.tmp -
Executes dropped EXE 1 IoCs
pid Process 2044 D958.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000_Classes\Local Settings D958.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1428 WINWORD.EXE 1428 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2044 D958.tmp -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1428 WINWORD.EXE 1428 WINWORD.EXE 1428 WINWORD.EXE 1428 WINWORD.EXE 1428 WINWORD.EXE 1428 WINWORD.EXE 1428 WINWORD.EXE 1428 WINWORD.EXE 1428 WINWORD.EXE 1428 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2044 1548 a45c180893d07ad8b8bac4f89e3ffcda.exe 89 PID 1548 wrote to memory of 2044 1548 a45c180893d07ad8b8bac4f89e3ffcda.exe 89 PID 1548 wrote to memory of 2044 1548 a45c180893d07ad8b8bac4f89e3ffcda.exe 89 PID 2044 wrote to memory of 1428 2044 D958.tmp 93 PID 2044 wrote to memory of 1428 2044 D958.tmp 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.exe"C:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\D958.tmp"C:\Users\Admin\AppData\Local\Temp\D958.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.exe 9F230F461AB59E724CACDD1E74DEB625267CC8AB66ACCC86FFD3640A6341828346E42576B244C5A56E65561392A6C7016BC99C9B960387D03FD6295D53B7C0EC2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD557be250b98fb12f7ce1fcc55e03ce15b
SHA12bd027d82482c0645cd01931f5ffcd5e0a0bdbee
SHA256aae0ea3b4ff75298d12581c1882a7e5f13ced74b79af89da0c5627070906f6c4
SHA512dbf10e5fa205779ef5ddda21077eb5b1586746ba4be5b8461771c5e0c134b531149a4df1bc796c8ffcce30a4647b36c1242749a15641770a3bc63db909d3a0c5
-
Filesize
1.4MB
MD549d62f0658b7469eff8f94d85656c8a3
SHA1541cba970f32486061c17f456280d172768b3e11
SHA25643a4f7e872a794f27c33ca1fc217694b4a7636bf23cc66c469d8adb2c854b6c0
SHA512c8a299b237c0b8e63b77e21c0f4daa0991b25f5d817b7d36bfee2d05f3f01dee789076e0aac990293f67be37e94b75d1648102c1fd368a7392faced9e5468694
-
Filesize
19KB
MD54046ff080673cffac6529512b8d3bdbb
SHA1d3cbc39065b7a55e995fa25397da2140bdac80c1
SHA256f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680
SHA512453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418