Analysis

  • max time kernel
    137s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 16:18

General

  • Target

    b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe

  • Size

    513KB

  • MD5

    3475004077786835281cd6437d05289a

  • SHA1

    71e551d7dd566106d30ba98e51637082ba74cd12

  • SHA256

    b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2

  • SHA512

    0a19d12c9d386d714fc57636252ac1b8759bcf6b0cc16545e3400d25793f62d5898c808c63e58c1c776a0def2ce87442f0d74257d13797d658ed07b647117265

  • SSDEEP

    6144:l8JsLcpjzTDDmHayakLkrb4NSarQWHRnnnnnBMmzCUHaXu7nxFV2uIsobksdGfF:izxzTDWikLSb4NS7gMwaXudfDIuOGfF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe
    "C:\Users\Admin\AppData\Local\Temp\b81ec3eed5416a9831acc7c6d126cd3c2155ea69452497b3b49a85b476d66ca2.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:112
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\网络部_导出表格_公文系统取数判断大于100_202405140932460000.xls"
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:3972
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\LenovoSoftwareFramework.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\LenovoSoftwareFramework.exe"
      2⤵
      • Executes dropped EXE
      PID:3520
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4012 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4424

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\LenovoSoftwareFramework.exe

            Filesize

            207KB

            MD5

            b3f34cc8e9ef36080929acec02fa44fa

            SHA1

            43fbd48e7cd0b30c8c1bc86355ada4ac0accbf7c

            SHA256

            617804769bd50dea345a409bb96d5b0c93fe7e4d407e5ef175ba2dce25e48853

            SHA512

            a246fcddff237b23a4cdb47a839251c8323277e259bcb54f45ee82a87f4a59ae47434ac0e636ac38a297899641c8d3c58e295a125b2d1ec01ee93e58b3c0ef0c

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\网络部_导出表格_公文系统取数判断大于100_202405140932460000.xls

            Filesize

            22KB

            MD5

            643847e133548f2a002a2e3763c8c763

            SHA1

            15a9ff93bdf6baaa61fe44bcd4cca39e0e4877fa

            SHA256

            a8a6b47ec6c33b66c865ac6405ea7f1539432b72dba5b81e32772642ecae00b8

            SHA512

            8a8ca0d2c8bf82812e1826284b9509052347b7da3990308b2078fb2729f15728dd6d1e3bda833271aa0feff16741c236b94c4e57d581e59ea90e0236ec7cdf3c

          • memory/3972-21-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-57-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

            Filesize

            64KB

          • memory/3972-10-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

            Filesize

            64KB

          • memory/3972-9-0x00007FFA25B8D000-0x00007FFA25B8E000-memory.dmp

            Filesize

            4KB

          • memory/3972-13-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-16-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-17-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-19-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-18-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-14-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

            Filesize

            64KB

          • memory/3972-15-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-20-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-11-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

            Filesize

            64KB

          • memory/3972-12-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

            Filesize

            64KB

          • memory/3972-40-0x00007FFA25B8D000-0x00007FFA25B8E000-memory.dmp

            Filesize

            4KB

          • memory/3972-24-0x00007FF9E3B10000-0x00007FF9E3B20000-memory.dmp

            Filesize

            64KB

          • memory/3972-25-0x00007FF9E3B10000-0x00007FF9E3B20000-memory.dmp

            Filesize

            64KB

          • memory/3972-37-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-22-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-41-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-56-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

            Filesize

            64KB

          • memory/3972-55-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

            Filesize

            64KB

          • memory/3972-23-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-58-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

            Filesize

            64KB

          • memory/3972-59-0x00007FFA25AF0000-0x00007FFA25CE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3972-8-0x00007FF9E5B70000-0x00007FF9E5B80000-memory.dmp

            Filesize

            64KB