Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
Plano_Client0039_Documento_Docx.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Plano_Client0039_Documento_Docx.exe
Resource
win10v2004-20240802-en
General
-
Target
Plano_Client0039_Documento_Docx.exe
-
Size
180KB
-
MD5
ca05247bad8dcd2ee95b294649c56576
-
SHA1
58c9750532ea8356596573dde49b8e134a344c2e
-
SHA256
fe270f4c239f8bdcaad52584876479d5ae45c175cc631af87bad763ab7d013a0
-
SHA512
0c4ae25952b3b7230961d4889a4033ad62cb49faebd066d0071f70e53d798d04a9bb649e6980de9dcbbc266696923ff30da261b66f2ca3e3d7537297be459766
-
SSDEEP
3072:hx0dz78MaVEGTgs0g0Aku4X+zvzfbqqDDX2h/r4Jx+v51ZRcZrB18EUxf:hWJUbTgbg0HuhvzeM2Z4J8vZRErdU
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ Plano_Client0039_Documento_Docx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ Plano_Client0039_Documento_Docx.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\laqe6601.dll Plano_Client0039_Documento_Docx.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plano_Client0039_Documento_Docx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Casa.clsCasa\Clsid Plano_Client0039_Documento_Docx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Casa.clsCasa Plano_Client0039_Documento_Docx.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 744 Plano_Client0039_Documento_Docx.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 744 wrote to memory of 2612 744 Plano_Client0039_Documento_Docx.exe 84 PID 744 wrote to memory of 2612 744 Plano_Client0039_Documento_Docx.exe 84 PID 744 wrote to memory of 2612 744 Plano_Client0039_Documento_Docx.exe 84 PID 2612 wrote to memory of 4868 2612 cmd.exe 86 PID 2612 wrote to memory of 4868 2612 cmd.exe 86 PID 2612 wrote to memory of 4868 2612 cmd.exe 86 PID 744 wrote to memory of 4940 744 Plano_Client0039_Documento_Docx.exe 95 PID 744 wrote to memory of 4940 744 Plano_Client0039_Documento_Docx.exe 95 PID 744 wrote to memory of 4940 744 Plano_Client0039_Documento_Docx.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Plano_Client0039_Documento_Docx.exe"C:\Users\Admin\AppData\Local\Temp\Plano_Client0039_Documento_Docx.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADDHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System/v EnableLUA /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADDHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System/v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:4868
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\laqe6601.dll2⤵
- System Location Discovery: System Language Discovery
PID:4940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5e6e2ce623e399a0edf1f2cb1e2082183
SHA154f0545aa3ac52f359fbc78fd746097fa3f89a7b
SHA25663612d2e0186007eb82b5bbdee9d3c1c93dfcd5b6bab704f320204b38c9f23dc
SHA5129f205d6461269d5827cc56e2af5e5acfb1d64a155a10cf48f9c42376060d7e050a9e3fa337bd7fe3eb100af58de8869e0e629632e280e3ea625118d4452783dc