Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
ec988abefad799b3a5cbda4504edc050N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ec988abefad799b3a5cbda4504edc050N.exe
Resource
win10v2004-20240709-en
General
-
Target
ec988abefad799b3a5cbda4504edc050N.exe
-
Size
467KB
-
MD5
ec988abefad799b3a5cbda4504edc050
-
SHA1
d5a99985eef10ed2bee46f2ef174193c32bcb8f4
-
SHA256
83e66109b18d85aaa3797665843ae6664225f0049e8e9430daabfa8c1c0903d7
-
SHA512
8e7ac3e4a905951ecde45187e18232a4bc717004dfbbecdbb216d61d489dc56a3f8e0814792349495def5bc052137cd6abdcde964df2e088f6d819daed10004a
-
SSDEEP
6144:mSyAAwKrd01YZW9mhO81rtfTWZGy1Q34HOSR4R5DLhFfUG3xpORuuW3XE+rf+QxB:PYO1QIubR5RF/3rORuuoXEOrkC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 9B75.tmp -
Executes dropped EXE 1 IoCs
pid Process 700 9B75.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9B75.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec988abefad799b3a5cbda4504edc050N.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 700 9B75.tmp -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings 9B75.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2140 WINWORD.EXE 2140 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 700 9B75.tmp -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2140 WINWORD.EXE 2140 WINWORD.EXE 2140 WINWORD.EXE 2140 WINWORD.EXE 2140 WINWORD.EXE 2140 WINWORD.EXE 2140 WINWORD.EXE 2140 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3772 wrote to memory of 700 3772 ec988abefad799b3a5cbda4504edc050N.exe 84 PID 3772 wrote to memory of 700 3772 ec988abefad799b3a5cbda4504edc050N.exe 84 PID 3772 wrote to memory of 700 3772 ec988abefad799b3a5cbda4504edc050N.exe 84 PID 700 wrote to memory of 2140 700 9B75.tmp 90 PID 700 wrote to memory of 2140 700 9B75.tmp 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec988abefad799b3a5cbda4504edc050N.exe"C:\Users\Admin\AppData\Local\Temp\ec988abefad799b3a5cbda4504edc050N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\9B75.tmp"C:\Users\Admin\AppData\Local\Temp\9B75.tmp" --pingC:\Users\Admin\AppData\Local\Temp\ec988abefad799b3a5cbda4504edc050N.exe 2121E7C481F6BD5741EC7D57EE6751C7F9A362CE2EB734A7D7E76ED336DE191D6FB99FBA8ACEE1338F9EFA8A6D8CCC21A632ED2B5317E60C950AA8E768C8DDDB2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ec988abefad799b3a5cbda4504edc050N.doc" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
467KB
MD5e2eebf79e5da9ade8df138669187115c
SHA14d4a68be9e39c69917205f2f182e42c15583a6c5
SHA256552556205be623fa1fd241f10a3fac6c20121ccdc0f255fe90db00ab7e563670
SHA512d328faadbfb85c944bf7b2c7718fb8f210faca986c0229b7efac0d157e2913b51077cf5a0f1f968b3da351b60e18ba2ed5f6f21f71e3d40836e4a7c50eeb5742
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
35KB
MD559975947e6db92e743655ebdf2e3c495
SHA15e967d85a4df28f9fed485156919a14fb411d18d
SHA25683c9df8884ffd5b51bdbdb9314d587477ecf50c3144c6c230ded3a3041f24e05
SHA5121cdc533bcc9bf50c69dd3a516c4fff8f24cf2ba9ecf1df885c12d4f459727b63c2d7f1a388ac0a4ac2fe59fe1bd5f5cb623001c736df33490fb245e06d7af692
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84