Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe
Resource
win10v2004-20240802-en
General
-
Target
e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe
-
Size
2.0MB
-
MD5
0fa75e9407747ae697433ec5d5f732bb
-
SHA1
1ef9328053fae90b015cbbf31a693ec1bfbbd0d1
-
SHA256
e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5
-
SHA512
4b6ef2e974d3fe19ac8cc6d2ecf888edda6dac772ad74ce68edab39a93dba5b5387c95663df7da1bf2399b7cce92fce48a331812872ba9664088f301f9d1a76e
-
SSDEEP
49152:r+CQS88KQUnnhs3YMuQIIUf3MaoOTNz5DZb5YRtLLy+z:6S8jQIq3YML+FoOTNVZtYRt3y
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 6784.tmp -
Executes dropped EXE 1 IoCs
pid Process 2024 6784.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6784.tmp -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2024 6784.tmp -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings 6784.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 208 WINWORD.EXE 208 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2024 6784.tmp -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE 208 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3148 wrote to memory of 2024 3148 e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe 84 PID 3148 wrote to memory of 2024 3148 e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe 84 PID 3148 wrote to memory of 2024 3148 e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe 84 PID 2024 wrote to memory of 208 2024 6784.tmp 91 PID 2024 wrote to memory of 208 2024 6784.tmp 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe"C:\Users\Admin\AppData\Local\Temp\e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\6784.tmp"C:\Users\Admin\AppData\Local\Temp\6784.tmp" --pingC:\Users\Admin\AppData\Local\Temp\e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe C36D17C8B656943A8264773AE318A51102C0099DDBEF38C411B1CCD5F971FA970319A6CCCEE5467690981A3EDF09D069AA1186FCF1C8063894FCDCDBE79DC1272⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD51757d346d73505b1e0fc45419510bed2
SHA1666869a9564901ae05c9e83fd5574433d9ce1b4f
SHA256c4b4891796cdbd74ab999556638c173b751f2eff0007c74ba8dc88e97e2492c9
SHA5128d715e4c7e56b6eec6bad422249bd1a54dfaa8ada9db4d05a97ef67728d5c83a6b14bdb4c74201bf1d8d15344231bddfcf8f67180c0ab5316f9f79fe1fa5ad95
-
C:\Users\Admin\AppData\Local\Temp\e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.docx
Filesize21KB
MD5e4098a63fecda5bb888f9714395acbc6
SHA10873005b98c70398e067eedf265a91214aca400e
SHA256acbc1966b31286bfa107541100ba4075af342a12bcbee0baecfbdad941e73fa6
SHA51264299baf51ffa5fc0fed933f1ee02dbb23b6ca9c8081be122462f3de3dffb74e2c103876e449a193689765bcd504aa1b2f798972112aae73bcfab14eb62e9322