Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe
Resource
win10v2004-20240412-en
General
-
Target
39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe
-
Size
212KB
-
MD5
d8595611b3070b80f6c85f46cdb8ca00
-
SHA1
be7f3b2368890cb661e50db380d997c6fbe4b565
-
SHA256
39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133
-
SHA512
f1243ff1c16942c5b26a4b2ab286762b1a4853bfde5feb2e0ad40ddeabb1c3c10999981aa11dfb236bae5e5a37277fd0810ed7013eebe25d26a7d9b85b5cef55
-
SSDEEP
6144:3sfO2JG4GpRKnvmb7/D26h/xFb8RQF9jwC/tRvPXbyheAg4ZIjJCe5SG:8fOUPURKnvmb7/D26xb8RQF9jwC/TvPz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" clvom.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation 39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe -
Executes dropped EXE 1 IoCs
pid Process 4972 clvom.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /f" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /A" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /B" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /q" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /c" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /j" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /H" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /w" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /S" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /P" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /X" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /N" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /E" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /L" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /C" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /p" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /k" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /l" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /r" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /v" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /M" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /V" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /O" 39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /K" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /F" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /t" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /Y" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /y" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /a" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /J" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /o" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /z" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /R" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /u" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /b" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /D" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /U" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /s" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /Z" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /Q" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /e" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /i" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /W" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /m" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /n" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /O" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /d" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /I" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /T" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /G" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /g" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /x" clvom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clvom = "C:\\Users\\Admin\\clvom.exe /h" clvom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1192 39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe 1192 39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe 4972 clvom.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1192 39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe 4972 clvom.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1192 wrote to memory of 4972 1192 39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe 91 PID 1192 wrote to memory of 4972 1192 39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe 91 PID 1192 wrote to memory of 4972 1192 39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe"C:\Users\Admin\AppData\Local\Temp\39fb7dc3b206876907e1053adc0fb542c021e7500a4313766e06eda4e4b2e133.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\clvom.exe"C:\Users\Admin\clvom.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD52b27a5be3ff19f9ffff875e41889f27e
SHA16c7abeeb79aa3dc9dc1570f6e276d3995cf8d6e4
SHA25640aa878b507e424f16dc66a2fa9c97d0bbab7e9167f2465a86c925100fc3c891
SHA5129aeed296edca1d478ef5567de659c4231c9d4e65bb8b62337823fc6405115c8b80345e62f396b28dde397c4a5359c20dbf5adb10d19ea254f3e3e5be2b8d49c7