Analysis
-
max time kernel
137s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe
Resource
win10v2004-20240226-en
General
-
Target
b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe
-
Size
513KB
-
MD5
3475004077786835281cd6437d05289a
-
SHA1
71e551d7dd566106d30ba98e51637082ba74cd12
-
SHA256
b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2
-
SHA512
0a19d12c9d386d714fc57636252ac1b8759bcf6b0cc16545e3400d25793f62d5898c808c63e58c1c776a0def2ce87442f0d74257d13797d658ed07b647117265
-
SSDEEP
6144:l8JsLcpjzTDDmHayakLkrb4NSarQWHRnnnnnBMmzCUHaXu7nxFV2uIsobksdGfF:izxzTDWikLSb4NS7gMwaXudfDIuOGfF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe -
Executes dropped EXE 1 IoCs
pid Process 3520 LenovoSoftwareFramework.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3972 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3972 EXCEL.EXE 3972 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3972 EXCEL.EXE 3972 EXCEL.EXE 3972 EXCEL.EXE 3972 EXCEL.EXE 3972 EXCEL.EXE 3972 EXCEL.EXE 3972 EXCEL.EXE 3972 EXCEL.EXE 3972 EXCEL.EXE 3972 EXCEL.EXE 3972 EXCEL.EXE 3972 EXCEL.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 112 wrote to memory of 3972 112 b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe 92 PID 112 wrote to memory of 3972 112 b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe 92 PID 112 wrote to memory of 3972 112 b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe 92 PID 112 wrote to memory of 3520 112 b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe 108 PID 112 wrote to memory of 3520 112 b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe"C:\Users\Admin\AppData\Local\Temp\b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\网络部_导出表格_公文系统取数判断大于100_202405140932460000.xls"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\LenovoSoftwareFramework.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\LenovoSoftwareFramework.exe"2⤵
- Executes dropped EXE
PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4012 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5b3f34cc8e9ef36080929acec02fa44fa
SHA143fbd48e7cd0b30c8c1bc86355ada4ac0accbf7c
SHA256617804769bd50dea345a409bb96d5b0c93fe7e4d407e5ef175ba2dce25e48853
SHA512a246fcddff237b23a4cdb47a839251c8323277e259bcb54f45ee82a87f4a59ae47434ac0e636ac38a297899641c8d3c58e295a125b2d1ec01ee93e58b3c0ef0c
-
Filesize
22KB
MD5643847e133548f2a002a2e3763c8c763
SHA115a9ff93bdf6baaa61fe44bcd4cca39e0e4877fa
SHA256a8a6b47ec6c33b66c865ac6405ea7f1539432b72dba5b81e32772642ecae00b8
SHA5128a8ca0d2c8bf82812e1826284b9509052347b7da3990308b2078fb2729f15728dd6d1e3bda833271aa0feff16741c236b94c4e57d581e59ea90e0236ec7cdf3c