Analysis
-
max time kernel
28s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 10:49
Static task
static1
Behavioral task
behavioral1
Sample
MantiWPF/MantiWPF.exe
Resource
win10v2004-20240730-en
General
-
Target
MantiWPF/MantiWPF.exe
-
Size
8.2MB
-
MD5
b95d746231fcec5e02fbbc91df346fb6
-
SHA1
be142be50f93919b3e1ad0a0019df24514692b84
-
SHA256
4f01f1b0d5f22d1b555a2890f176b9ff9269481ff8d99610968843e393430337
-
SHA512
21146da77836345c79269fd56d0eb0ddc97c2bdcf0de5b85c43e63b3cee8de1aa60be6c3a75e8a4c228681e4bcb986fe2d4236d0280ab564958e1458944517fa
-
SSDEEP
196608:7UwGkc6K6n6EkD+AXRs5oF3qheHA6Ra4yUg:IwGkc3ikDFs5Y3qsJa4yJ
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1644 1824 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MantiWPF.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4856 WINWORD.EXE 4856 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4856 WINWORD.EXE 4856 WINWORD.EXE 4856 WINWORD.EXE 4856 WINWORD.EXE 4856 WINWORD.EXE 4856 WINWORD.EXE 4856 WINWORD.EXE 4856 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\MantiWPF\MantiWPF.exe"C:\Users\Admin\AppData\Local\Temp\MantiWPF\MantiWPF.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 16522⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1824 -ip 18241⤵PID:1988
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\RestartClear.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397B
MD54cb56762aa2a9df72a8ef5b2e0fa2dfb
SHA1cacdb6b1cfb49247f59d5a7ef84399284fe809f5
SHA2564b2ae46e64e86564ba36114a58157dcade463b71ee9726b4d4eea5828e71980f
SHA51252233858aae11d72b5a8b1a26fc82b1fe994ebc69f4ade62cc005149498dbc28aa82f74178920231d4515ae796fed132f4e8e19b441e0dedbaa54ab212da38d1
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84