Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2024, 18:03

General

  • Target

    372b419c76cd1a83e9328d68d990a06a24c42e7aa6d824dbcbca7b04d5ec7825.exe

  • Size

    467KB

  • MD5

    9920ae0798381fbb8b1ac44989c2ba41

  • SHA1

    f186377fc948d06ffe43231ad2ebe1f5b4d02873

  • SHA256

    372b419c76cd1a83e9328d68d990a06a24c42e7aa6d824dbcbca7b04d5ec7825

  • SHA512

    c5dbdea66df8a092a36be6c4074672d13b82b701db07cc3f4badef883c4258051570680e6d2fbf7fa79649ebeb0f2bca5fc20adf87e82d73a489e013c2b244ce

  • SSDEEP

    6144:p2jWdaEaa66s8do9PNbn1lfF4jgfg9UwFX5WL0OeGHPD6XX6XREo0YTB9hVrBM2t:pWBm+95nHfF2mgewFX5cLuq6IBY21T

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\372b419c76cd1a83e9328d68d990a06a24c42e7aa6d824dbcbca7b04d5ec7825.exe
    "C:\Users\Admin\AppData\Local\Temp\372b419c76cd1a83e9328d68d990a06a24c42e7aa6d824dbcbca7b04d5ec7825.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\44C9.tmp
      "C:\Users\Admin\AppData\Local\Temp\44C9.tmp" --pingC:\Users\Admin\AppData\Local\Temp\372b419c76cd1a83e9328d68d990a06a24c42e7aa6d824dbcbca7b04d5ec7825.exe 872AAB89C2933FDCB404CD4A0ACD2C9931AA9D61FF81B1CB98E81BF1E168991C7AACDE8E912612A6719B1EACE8D743CAAC1CCC5DFD98C8464AA6B86A88AE95E9
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3640
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\372b419c76cd1a83e9328d68d990a06a24c42e7aa6d824dbcbca7b04d5ec7825.doc" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:3056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\372b419c76cd1a83e9328d68d990a06a24c42e7aa6d824dbcbca7b04d5ec7825.doc

          Filesize

          35KB

          MD5

          59975947e6db92e743655ebdf2e3c495

          SHA1

          5e967d85a4df28f9fed485156919a14fb411d18d

          SHA256

          83c9df8884ffd5b51bdbdb9314d587477ecf50c3144c6c230ded3a3041f24e05

          SHA512

          1cdc533bcc9bf50c69dd3a516c4fff8f24cf2ba9ecf1df885c12d4f459727b63c2d7f1a388ac0a4ac2fe59fe1bd5f5cb623001c736df33490fb245e06d7af692

        • C:\Users\Admin\AppData\Local\Temp\44C9.tmp

          Filesize

          467KB

          MD5

          95bfe821e3af58ba8933af1ee1072ddd

          SHA1

          8e4270447196023383cdd69a71755a6459332426

          SHA256

          98b927a5d9d77ad9b022ec733f3fa0d44f2e6074c0076024c711e946a782d18d

          SHA512

          445092bc207ac65c6f4c590390324035a715a0dc5dff96b2743a192624d7d6a15a190bee0e6eacd4c1ae727e53a2bd617210d9b85bdd42432c267f2d3474a958

        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • memory/1600-0-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/1600-6-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/3056-27-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-31-0x00007FF84F7B0000-0x00007FF84F7C0000-memory.dmp

          Filesize

          64KB

        • memory/3056-18-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-19-0x00007FF852010000-0x00007FF852020000-memory.dmp

          Filesize

          64KB

        • memory/3056-21-0x00007FF852010000-0x00007FF852020000-memory.dmp

          Filesize

          64KB

        • memory/3056-22-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-23-0x00007FF852010000-0x00007FF852020000-memory.dmp

          Filesize

          64KB

        • memory/3056-20-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-24-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-25-0x00007FF852010000-0x00007FF852020000-memory.dmp

          Filesize

          64KB

        • memory/3056-26-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-82-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-29-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-28-0x00007FF84F7B0000-0x00007FF84F7C0000-memory.dmp

          Filesize

          64KB

        • memory/3056-30-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-17-0x00007FF852010000-0x00007FF852020000-memory.dmp

          Filesize

          64KB

        • memory/3056-81-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-53-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-54-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-55-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-56-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-75-0x00007FF852010000-0x00007FF852020000-memory.dmp

          Filesize

          64KB

        • memory/3056-76-0x00007FF852010000-0x00007FF852020000-memory.dmp

          Filesize

          64KB

        • memory/3056-77-0x00007FF852010000-0x00007FF852020000-memory.dmp

          Filesize

          64KB

        • memory/3056-78-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-80-0x00007FF891F90000-0x00007FF892185000-memory.dmp

          Filesize

          2.0MB

        • memory/3056-79-0x00007FF852010000-0x00007FF852020000-memory.dmp

          Filesize

          64KB

        • memory/3640-5-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/3640-16-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB