Analysis
-
max time kernel
1063s -
max time network
1176s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/03/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
ChessBase17Setup-X64-msi-485749 (1).zip
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
Install_01210.exe
Resource
win11-20240221-en
General
-
Target
Install_01210.exe
-
Size
29.0MB
-
MD5
6880da84ed207bb9bbd8494d77fe0544
-
SHA1
5fcefe8147134094104f7911f66ff07d93b4ac19
-
SHA256
73c3d0ee7cb8d159b021e612fc3011165a7331f4b4f88f238d5c452e27c3862b
-
SHA512
6eb73feabdbae89750904b6ed62895750f8f6790ed873b24c71d9a04d576c5efad51fc5b44c6400495fed058abf4710d3307066f206418e66b4594a23bf2bd0a
-
SSDEEP
786432:bDXmuedKvJTsJmpbJofQZTib6fzfHwSN2MbSZNjt3KWAv61:nt76fQZ86fTHwSN2MbSZXKW91
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4932 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4200 Install_01210.exe 4200 Install_01210.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4200 Install_01210.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4200 Install_01210.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4932 EXCEL.EXE 4932 EXCEL.EXE 4932 EXCEL.EXE 4932 EXCEL.EXE 4932 EXCEL.EXE 4932 EXCEL.EXE 4932 EXCEL.EXE 4932 EXCEL.EXE 4932 EXCEL.EXE 4932 EXCEL.EXE 4932 EXCEL.EXE 4932 EXCEL.EXE 4932 EXCEL.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install_01210.exe"C:\Users\Admin\AppData\Local\Temp\Install_01210.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4200
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1844
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /n "C:\Users\Admin\Downloads\SaveBackup.xlt"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253B
MD522bd3e4697c4ade9c5323ab31d0da0f5
SHA1f9a3fc196d30f531b6d80727cad538eabbd71c67
SHA256aee61f4f5be94e6b0eaacb02dd7ca2c4f567fa7f38839af94a393da1e97c8977
SHA512e0ace53386a5c9d2cb6c157138e018f136b5fe5b936b1fad437571b98856e286fddca62293a99b8a1eb7b910dc0f5a6ff7c9f82f7a149e10bad334d8550a57d4