Analysis
-
max time kernel
149s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20240508-en
General
-
Target
sample.exe
-
Size
445KB
-
MD5
25e87c4070d459f5259b60dbe6c985bb
-
SHA1
ae2d0882d9630798c061cc2a54ed8a913d289fce
-
SHA256
c580a88c58ac898f5090dab9be5249fdfb2e1b4dfaaf4646224edab76be63fea
-
SHA512
06fb28d697ddb01a7e7d29e330fd74d9c48261cea9ad7771e17497b2639871c8c1b40a11cad22c901e8674caf75630158dc34f191191115699f37ee7f3e5825e
-
SSDEEP
6144:iw+R+VrYjQf/KOgzTrMzWdKT1f/5dWDquH2sJgHvKr8e0lYx6kgIHsL:cEVrZf/ATwzbS2mgPlyzdHu
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023446-81.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation sample.exe -
Executes dropped EXE 2 IoCs
pid Process 228 kspoold.exe 404 kspoold.exe -
resource yara_rule behavioral2/files/0x000700000002328e-4.dat upx behavioral2/memory/228-8-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-12-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/228-48-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/files/0x0007000000023446-81.dat upx behavioral2/memory/404-111-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-600-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-626-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-665-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-685-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-719-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-772-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-792-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-826-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-877-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-921-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-955-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-989-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-1026-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral2/memory/404-1060-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates connected drives 3 TTPs 5 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: kspoold.exe File opened (read-only) \??\G: kspoold.exe File opened (read-only) \??\H: kspoold.exe File opened (read-only) \??\I: kspoold.exe File opened (read-only) \??\J: kspoold.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\kspoold.exe sample.exe File created C:\Windows\SysWOW64\avmeter32.dll kspoold.exe File opened for modification C:\Windows\SysWOW64\avmeter32.dll kspoold.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings sample.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5012 WINWORD.EXE 5012 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE 5012 WINWORD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 228 2128 sample.exe 82 PID 2128 wrote to memory of 228 2128 sample.exe 82 PID 2128 wrote to memory of 228 2128 sample.exe 82 PID 2128 wrote to memory of 5012 2128 sample.exe 84 PID 2128 wrote to memory of 5012 2128 sample.exe 84 PID 2128 wrote to memory of 376 2128 sample.exe 85 PID 2128 wrote to memory of 376 2128 sample.exe 85 PID 2128 wrote to memory of 376 2128 sample.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\kspoold.exe"C:\Windows\system32\kspoold.exe" /INSTALL /SILENT2⤵
- Executes dropped EXE
PID:228
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\sample.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5012
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\sample.exe"2⤵PID:376
-
-
C:\Windows\SysWOW64\kspoold.exeC:\Windows\SysWOW64\kspoold.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
122KB
MD5f315a017e56c55660fafa9a69465a496
SHA1e8d959768a451519bb915c375dd15ab05361a841
SHA256737a149bfe1c0e12bee77399f2e7e93c397be7c2e7c389682eadc69fec4877f6
SHA512cbbb50c9325d598cc287de8a8c9f0b03e14e833439065574a7d0c133e6e8150c1fbc116893869ec8801f337b30fe024e91eff06914923c3f64a154eabf382f57
-
Filesize
59KB
MD511c600c13b4c72c6cbd405ffaceb110f
SHA1e343dc7af59b8e3262175f15f7e2610bdaa85038
SHA256a3ee82335395e9c85173cde936c8b8ca62de4ab5bc23a231f73821038d628c69
SHA512d6cfec1d588be67b1e9ffbd0b5d531aac1eae587c49677310b323a9fa152bc99b013315ebc55ea895dd072e8909a6ceb7daf12bb5e55c57008ce6cd7ad279def
-
Filesize
278KB
MD5cf36d2c3023138fe694ffe4666b4b1b2
SHA108cd6314e99d1091c71bc21b6da680522ca6a161
SHA25606eb602792cbe8fd01002eb34898bfd78beac30ce2b0384bd90f64db95f72afc
SHA512b118ffc93f5a4be0f3e80cfdba4fda0af98d310db7a05d1ada1fdc6b7ca0f5041ab6132a227367215e3c4e66bf6f3aecec45caf625bb93609705ea25cfb66df3
-
Filesize
700B
MD581d7e0349bb9e4bbcba8f53814c7bfe0
SHA12b4a0d55318e3c00c24905bd7815900df1ff3254
SHA256cc489be6a2cb75453cef5071b38f0669ac93601234a32af735c78a446e87dbf2
SHA512dad7e8cb60aed6720d7796fedc6338ba111befa54a80211e80911b4f1029dd290f65f71523bcaec3545dae578fffa7637551d7ff865a84cc7e8d18c3fb5210f5
-
Filesize
4KB
MD54cf01890bddd0cd9d4911181df3f6703
SHA13c00a76b50b5e7a30e5641d00bf4f2633cdf34d6
SHA256d075a20a61c717285ccd4d820fffde6889b430cc6172e25313d531fc85484f4c
SHA5123d1f701fe33db1ba473869363729dce83eb35f52ac7d27240fcddf1cfae4e9bcc7607250a3dcf2b242cf09ff7f83e72c8f33d53454852c1e7bfd4719eabd5a12