Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 02:25
Behavioral task
behavioral1
Sample
2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe
Resource
win7-20240708-en
General
-
Target
2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe
-
Size
6.0MB
-
MD5
27e0a52f211b07f18551d55337e0ccd6
-
SHA1
439a358232c8dc04467a450530b3a191149684df
-
SHA256
2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26
-
SHA512
2bd7cbc4062a2e69f8e8b877835e89ccbe15a05c2a712f435f8670c9f53a4bf70a6e867571a15abfb126483a36f559fd0c9c4c0a26cfe73aae5f001de8bc5465
-
SSDEEP
196608:TwF0LLZedzOTbLAf0N0/0BykcAX6jmuyz7i8Bt:TacTbcftZAX6jPy68
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1896 sg.tmp 3236 DocBox.exe -
Loads dropped DLL 1 IoCs
pid Process 3236 DocBox.exe -
resource yara_rule behavioral2/memory/396-0-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/396-224-0x0000000000400000-0x0000000000588000-memory.dmp upx -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer DocBox.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName DocBox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DocBox.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\ProcessorNameString DocBox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DocBox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString DocBox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor DocBox.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily DocBox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion DocBox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer DocBox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName DocBox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS DocBox.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION DocBox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\DocBox.exe = "11001" DocBox.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeBackupPrivilege 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe Token: SeRestorePrivilege 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe Token: 33 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe Token: SeIncBasePriorityPrivilege 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe Token: 33 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe Token: SeIncBasePriorityPrivilege 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe Token: 33 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe Token: SeIncBasePriorityPrivilege 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe Token: SeRestorePrivilege 1896 sg.tmp Token: 35 1896 sg.tmp Token: SeSecurityPrivilege 1896 sg.tmp Token: SeSecurityPrivilege 1896 sg.tmp Token: 33 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe Token: SeIncBasePriorityPrivilege 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3236 DocBox.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 396 wrote to memory of 3600 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe 87 PID 396 wrote to memory of 3600 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe 87 PID 396 wrote to memory of 1896 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe 89 PID 396 wrote to memory of 1896 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe 89 PID 396 wrote to memory of 1896 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe 89 PID 396 wrote to memory of 3236 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe 91 PID 396 wrote to memory of 3236 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe 91 PID 396 wrote to memory of 3236 396 2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe"C:\Users\Admin\AppData\Local\Temp\2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c set2⤵PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\~3723364304916740346~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\2e255b135e7d6b5689d00c77213d76ad7a81824398f1b6f896f708c7ff68dd26.exe" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\~6927167502316901144"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\~6927167502316901144\DocBox.exe"C:\Users\Admin\AppData\Local\Temp\~6927167502316901144\DocBox.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
PID:3236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
6.3MB
MD5483caddd498fa1983428fd9f15afa4f2
SHA1cbc0d77e01e3e6e8821a4e2e1764c086b8a725ab
SHA25601aed8507b69d3e30a24ca7790ab868b1f7a50ea012bd822c685bedf241d9fd0
SHA512d01d9ba04aef17e14f139bcdaec66146a413c58259f55f138bf2dc8f9705e45944d822f724d6f0e49ec1fea5607c5f1961b71673f11c48d5775ff2e299691e7e
-
Filesize
6.2MB
MD5ad3f7d20063342ca9cbb01c835e6a7c4
SHA1e3bb16b16bb876f25491da6760ccb38912af1c5a
SHA256c55976cde75bc886f7bae7a1c42fdb7b0a135bd5bba6d82db40cdfeb224bf3a0
SHA512a702416f280756d98300da3cf31098a985c4e0f66c4140f640df08428fcd2b7c0ca3dd26a1fef138ca1c71acc9bbc8adeb7f24260a794f71675da62f8718d124