Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe
Resource
win10v2004-20240226-en
General
-
Target
d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe
-
Size
461KB
-
MD5
b03192389159b15f5552c82a29c747fe
-
SHA1
a9d64e615171b05a402422056ddfcd250febae93
-
SHA256
d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b
-
SHA512
acc12fd9cd4b4ddf3dcab060be01f6369ef8f8b77af6757e065c22df43a3d8796e8c46b485e9c68f37816c6f439ddf23e9fc9e1f647438e80f589418da7b5a40
-
SSDEEP
12288:bxmIJQvPkitVCR3pPuIyDxs/db32AVUKo:NmoO8itVsZPuxlkj28UKo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation apple.exe -
Executes dropped EXE 3 IoCs
pid Process 2212 apple.exe 4180 siteadv.exe 4488 siteadv.exe -
Loads dropped DLL 3 IoCs
pid Process 4180 siteadv.exe 4488 siteadv.exe 4488 siteadv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MediaLoader = "C:\\Users\\Admin\\Wmi Player\\siteadv.exe run cc.tmp" siteadv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000_Classes\Local Settings d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1916 WINWORD.EXE 1916 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4180 siteadv.exe 4180 siteadv.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE 1916 WINWORD.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3364 wrote to memory of 2212 3364 d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe 96 PID 3364 wrote to memory of 2212 3364 d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe 96 PID 3364 wrote to memory of 2212 3364 d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe 96 PID 3364 wrote to memory of 1916 3364 d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe 98 PID 3364 wrote to memory of 1916 3364 d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe 98 PID 2212 wrote to memory of 4180 2212 apple.exe 99 PID 2212 wrote to memory of 4180 2212 apple.exe 99 PID 2212 wrote to memory of 4180 2212 apple.exe 99 PID 4180 wrote to memory of 4488 4180 siteadv.exe 100 PID 4180 wrote to memory of 4488 4180 siteadv.exe 100 PID 4180 wrote to memory of 4488 4180 siteadv.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe"C:\Users\Admin\AppData\Local\Temp\d3a50abae9ab782b293d7e06c7cd518bbcec16df867f2bdcc106dec1e75dc80b.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Roaming\apple.exe"C:\Users\Admin\AppData\Roaming\apple.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\Wmi Player\siteadv.exe"C:\Users\Admin\Wmi Player\siteadv.exe" stat cc.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\Wmi Player\siteadv.exe"C:\Users\Admin\Wmi Player\siteadv.exe" install_del cc.tmp C:\Users\Admin\AppData\Roaming\apple.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:4488
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\0417.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4416 --field-trial-handle=2972,i,4036376905309803364,5412922217215781933,262144 --variations-seed-version /prefetch:81⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5a75c81a18e3965b5942e7b1669db16ca
SHA1aad3241fd23372523528a99f4c18127a3ebbea59
SHA2563e57ca992c235b68027cb62740d8e86a3294ac0ebcff4a2683b29bdaec016646
SHA5123b8e11170ea7379ce8130dbd6d3a220cf4aa810308dc24f0c1b2fc1399200a7e8d8e258d0d2f5025e269c131dc2d6ac5dc28beedce839b9815574ed248c3a335
-
Filesize
241B
MD5fa4d67ec5c66e6be06e0b1fd6394699c
SHA1be115bd7f01a8ab2c253f82a3796395adec38ddb
SHA256744988a5cb0984faac84617d2ee7a2bd46e401a1f655e8ae70687eefb8f2135f
SHA512ffc7ff5a514e57b45e4f52b6c578d36cbba8830ceb7c8c805afa5eb5f349577b5345be6ada4ab9942734114f2903ebdebdda8ae465d7606132e556ea9c9ffb1d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5f8607eb76de477b1911f2b6949bbdef9
SHA12f966ddbc0ba7645990de4d52438e50168144172
SHA2569a1e0fb0649ddd1467f44b03aa23c833223b8f6f7860200e85275eee30fbdc81
SHA512698e0290efef69ab6bbccb562d959d1ba9c3baa92b8f41d4910c6b3fd5832f0eb4423584a494d82bb58b9f59d9b50b8b2d4a96530be0024150242138eab13da3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD59328a7d826c2c0ee44c042d66be0ff99
SHA11e86076b7dc8c90db8bfe3e44728e0c243fdcb21
SHA256e8ff07f76004221efb292046782bcdb8de38daecdb562abc4f4e12efb9e4cc5d
SHA5126a28e0ab878b061e0128284798547b76fbf0b96e847d0ff5de6135017081b0657f3579e0b6257b12c0da853a4c9ecbc54237f6c312aa9cd842a4f4370ee2f2d4
-
Filesize
290KB
MD5b1f907379148c1e09009cda3cbd3877b
SHA1e29b263a89217412f45d6c7a0235b19af030755a
SHA256c3415bddc506839614cbb7186bfc6643713806de4f5b1c15445e96a644b44bea
SHA512ced809231a420a63210edd3cb13a2b0696435bc043c1a61bfb8b025f242e562cdfd843a65ecdea97aaea2b86d4d5a384f9233787e6509bc88341c5cfed1bd5be
-
Filesize
70KB
MD5343a9cc37cc9843cf862dd946c7eb714
SHA1d5ce13a66e8407baec0f447c7fb41d493fd8d73a
SHA25650f035100948f72b6f03ccc02f9c6073c9060d6e9c53c563a3fdb1d0c454916e
SHA5125210640adf6ebfeb724e7700dcc4bb7e251541b59a2c2b1dd80e5a683e209a90f4af92de438dacec6b54c12c0c5922af3c5e12e8ab9c0f467ff13d9005a7ca81
-
Filesize
85KB
MD527ea69e0233f32d521c7bb1330690731
SHA1ec928047d511286c4db2580045d02ced34b639ea
SHA25669863ba336156f4e559364b63a39f16e08ac3a6e3a0fa4ce11486ea16827f772
SHA512fa6936f6b66add038c007ec530e7703e426d8c2bff32faf0dc0688512fdbc7331f423edc89f90ffeb059d25baef977b69fcdc8b43e89af4f467dbb077e062e6c
-
Filesize
34KB
MD50584b8020e41db48e267d26c641339c3
SHA1de8b5b36e3638dc757cc3e7e7345b52f3e14b72e
SHA256eb3b4e82ddfdb118d700a853587c9589c93879f62f576e104a62bdaa5a338d7b
SHA5123a81b260a37b3bdfc0fffa08ab98cf6ebff3123a76c6f637d83471187e357d0af2e8d9eefe6ea32af9274dde732a7795312dded500a92c6bf3bedaf408abab07