Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
b5b41653cd99c247f775d2f0bad8f99d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5b41653cd99c247f775d2f0bad8f99d.exe
Resource
win10v2004-20240226-en
General
-
Target
b5b41653cd99c247f775d2f0bad8f99d.exe
-
Size
464KB
-
MD5
b5b41653cd99c247f775d2f0bad8f99d
-
SHA1
925a6512a26daeeadda9b5b38d0f9613be25c290
-
SHA256
8aaa02cb23a65170200c0119b22ca6ca0ce242fd6f6e76282984ada900b20aa5
-
SHA512
12c5b56f1913c0bec7437cbb8cccb8097923062895040200e5ce682cbb88bf125a7c45137a469d13bea1661224ecf5189e647a823b7212cc1885302f2ab596a2
-
SSDEEP
6144:zRPu8zwNAZYCZrIik3tHSXnbgOdd8pgi0dLUc2gKKhT1l5b8QoPZJCvEsH5f:zJrIik3ObgGd8pgi0LlKKhT1c3zCvN9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 6801.tmp -
Executes dropped EXE 1 IoCs
pid Process 2584 6801.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000_Classes\Local Settings 6801.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 632 WINWORD.EXE 632 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2584 6801.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2628 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1372 wrote to memory of 2584 1372 b5b41653cd99c247f775d2f0bad8f99d.exe 89 PID 1372 wrote to memory of 2584 1372 b5b41653cd99c247f775d2f0bad8f99d.exe 89 PID 1372 wrote to memory of 2584 1372 b5b41653cd99c247f775d2f0bad8f99d.exe 89 PID 2584 wrote to memory of 632 2584 6801.tmp 93 PID 2584 wrote to memory of 632 2584 6801.tmp 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5b41653cd99c247f775d2f0bad8f99d.exe"C:\Users\Admin\AppData\Local\Temp\b5b41653cd99c247f775d2f0bad8f99d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\6801.tmp"C:\Users\Admin\AppData\Local\Temp\6801.tmp" --helpC:\Users\Admin\AppData\Local\Temp\b5b41653cd99c247f775d2f0bad8f99d.exe 53C3C76015C899A4657C88A21307ADE7DFD76B98C598292587363A95F7BE3ACE68499297A94C84BF20A0A6F8B2F91BB49E8537BE5A8DAB5DF8A448F7375157022⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\b5b41653cd99c247f775d2f0bad8f99d.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:632
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD522cf47808b59fa1309b5507fe8716bcc
SHA1302b91907030a72996a0707bf9ee89eee1f39fde
SHA2564db3aaf80b27a22ee51669cbe513fc45cca3c99804c79ec33427dc96136f61bd
SHA512cd9adb2ddc97f787d10b2d79fa3859abeb80036f84a2781d92bf645f184a7633b232fd7da73141bf9796d57cbe4810294b669c061572215638496c6f51f187c2
-
Filesize
21KB
MD57079891932a64f097abafd233055a1e9
SHA1246d95feafe67689d49a5a4cadba18d3ac1914e5
SHA256c97189b50e5e92be09966d4732b6d61a2e435b2935d60c09989e555ae442e7a1
SHA5126e9ee6427d7cc2474dc634b088cf3f35d06dfb734d2b63fbbc794f4083b4b5754379daff4804bf5024b1b430aa5e50fa6d839d3473ceeed3043d373c85e9862a