Overview
overview
7Static
static
3ASEAN 2024.lnk
windows7-x64
3ASEAN 2024.lnk
windows10-2004-x64
7MS.lnk
windows7-x64
3MS.lnk
windows10-2004-x64
7Mofa memo.lnk
windows7-x64
3Mofa memo.lnk
windows10-2004-x64
7NS.lnk
windows7-x64
3NS.lnk
windows10-2004-x64
7_/_/_/_/_/...oy.dll
windows7-x64
3_/_/_/_/_/...oy.dll
windows10-2004-x64
3_/_/_/_/_/...ce.exe
windows7-x64
6_/_/_/_/_/...ce.exe
windows10-2004-x64
6Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
ASEAN 2024.lnk
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ASEAN 2024.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
MS.lnk
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
MS.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Mofa memo.lnk
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Mofa memo.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
NS.lnk
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
NS.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
_/_/_/_/_/_/_/_/_/_/_/_/GetCurrentDeploy.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
_/_/_/_/_/_/_/_/_/_/_/_/GetCurrentDeploy.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
_/_/_/_/_/_/_/_/_/_/_/_/office.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
_/_/_/_/_/_/_/_/_/_/_/_/office.exe
Resource
win10v2004-20240802-en
General
-
Target
Mofa memo.lnk
-
Size
1KB
-
MD5
698382d42978ee9b86046682cacc76ab
-
SHA1
dd149a0c4a650df907557b3c0219fde81d339d11
-
SHA256
e537c5da268c6a08d6e94d570e8efb17d0ca3f4013e221fadc4e0b3191499767
-
SHA512
e02706545ef29a769c73a664380d9d86f5dc75a7c377b79aa86840270ff1b38f2d4eb24c4dd640556a2b6bf740ff28654f287932bbc66f842d76bab079d9ef46
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gameestrto = "C:\\Users\\Public\\office.exe StarWegameToyOU" office.exe -
System Binary Proxy Execution: ScriptRunner 1 TTPs 1 IoCs
Adversaries may abuse ScriptRunner to proxy execution of malicious code.
pid Process 2060 ScriptRunner.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language office.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3472 wrote to memory of 2060 3472 cmd.exe 85 PID 3472 wrote to memory of 2060 3472 cmd.exe 85 PID 2060 wrote to memory of 1332 2060 ScriptRunner.exe 86 PID 2060 wrote to memory of 1332 2060 ScriptRunner.exe 86 PID 2060 wrote to memory of 1332 2060 ScriptRunner.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Mofa memo.lnk"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\System32\ScriptRunner.exe"C:\Windows\System32\ScriptRunner.exe" -appvscript _\_\_\_\_\_\_\_\_\_\_\_\office.exe2⤵
- System Binary Proxy Execution: ScriptRunner
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\_\_\_\_\_\_\_\_\_\_\_\_\office.exe"C:\Users\Admin\AppData\Local\Temp\_\_\_\_\_\_\_\_\_\_\_\_\office.exe"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1332
-
-