Analysis
-
max time kernel
124s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
Hovac_API.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Newtonsoft.Json.dll
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
RobloxExec2.exe
Resource
win7-20240705-en
General
-
Target
Hovac_API.dll
-
Size
302KB
-
MD5
fd6d62736b57c4cdc6239100d26c7004
-
SHA1
8f8b33152d5681b49891c340bc80ab677041890c
-
SHA256
debb42b3017c947881e28ca87ad33dbd47c87d5752daa85975187f99f761c29d
-
SHA512
4384eba9312667b4aa385dd709b8a4dd5732ae426d1984d8ba6909e998854b1957f8dc42c52bbe16eaf69bd49109f8ba17af54879dc174b43759f8476aaf5522
-
SSDEEP
6144:pxxiw0qvLJXnlUGujCtjno6itQl+REw6FMG/UHQS8PUHIRA8yVYtFm6axHU+:BkqjVnl36ud0zR/6CtQ9PUHIG8Dn+
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\WF.msc mmc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxExec2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxExec2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RobloxExec2.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1624 WINWORD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 mmc.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 2768 RobloxExec2.exe Token: 33 2576 mmc.exe Token: SeIncBasePriorityPrivilege 2576 mmc.exe Token: 33 2576 mmc.exe Token: SeIncBasePriorityPrivilege 2576 mmc.exe Token: 33 2576 mmc.exe Token: SeIncBasePriorityPrivilege 2576 mmc.exe Token: 33 2576 mmc.exe Token: SeIncBasePriorityPrivilege 2576 mmc.exe Token: 33 2576 mmc.exe Token: SeIncBasePriorityPrivilege 2576 mmc.exe Token: 33 2576 mmc.exe Token: SeIncBasePriorityPrivilege 2576 mmc.exe Token: 33 2576 mmc.exe Token: SeIncBasePriorityPrivilege 2576 mmc.exe Token: 33 2576 mmc.exe Token: SeIncBasePriorityPrivilege 2576 mmc.exe Token: SeDebugPrivilege 1920 RobloxExec2.exe Token: SeDebugPrivilege 3028 RobloxExec2.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2576 mmc.exe 2576 mmc.exe 1624 WINWORD.EXE 1624 WINWORD.EXE 1624 WINWORD.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Hovac_API.dll,#11⤵PID:2296
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\RobloxExec2.exe"C:\Users\Admin\AppData\Local\Temp\RobloxExec2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\WF.msc"1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2576
-
C:\Program Files\Windows Defender\MSASCui.exe"C:\Program Files\Windows Defender\MSASCui.exe"1⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\ose00000.exe"C:\Users\Admin\AppData\Local\Temp\ose00000.exe"1⤵PID:1592
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\DisableExpand.docm"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1624
-
C:\Users\Admin\AppData\Local\Temp\RobloxExec2.exe"C:\Users\Admin\AppData\Local\Temp\RobloxExec2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
C:\Users\Admin\AppData\Local\Temp\RobloxExec2.exe"C:\Users\Admin\AppData\Local\Temp\RobloxExec2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c1b9c2d92ece8ae4eeba9121bea892d
SHA1851e60eed7ef6588d32f0146a10758267a84ca02
SHA25626099af21fe0b406cf52fc00af54f6ab89b5f40ea1c6ee0f91dbfd5352e019a1
SHA512a191feeaf8e2d0802b2fcbd426385c5b6ec669605d45d5d35e7becbc6b6bc7c3c5b8d17bb963db19064fd8572863aa0c9b8aeac525a77ad18ef529f2806aea0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66ed1c9dfbc523a509949b446a58ad1
SHA1badee25263b746435c4ad2498e8e4a3473af4731
SHA2564d076a36c94b8ddca0290f0108931c8f3f53294455d6dd1efa723bbae095f7ae
SHA512e77c80389cdaa564be9611ec22c0231e07c1b16fba7dc401d5d665463b040c7684893b8e2f74839462d19d8ca835ea2bc200325219aaa2c9494e9d50a5161179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cce49eb37f91972d90d623c77cdc649
SHA14871a99a452033e5c6c3aa27cbbab382b03a8a8e
SHA2564af6848fe583d43985df7aa1916d127c5660bdfffaf207ff91e94bcf2afcdb67
SHA512d53499c2c6b5d74854d1e26bae563018a086b42461effae6ddcde47ea408c129c217aeb105121c461baaf88e259dcb91e2e47a336fd264d20079ea8b9a05b3fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
19KB
MD51cc53409655366afc2045a618fbd6f68
SHA111e73bfb4cb8740bf210f1451abd0edd0ee72daa
SHA256a792ae6256cdffa764e739c91e5ff879135cfb8f633578e041e3eb0708aa7ebc
SHA5129c234bcb518819818dcae285543cfc3bd96f3476b9992f1cf00960346ad1d401184c23c4efd78879e6b216693a27dcdf357bdd55c5848c8725808bc512c94d01