Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 16:11
Behavioral task
behavioral1
Sample
krpt.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
krpt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wps.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
wps.exe
Resource
win10v2004-20241007-en
General
-
Target
wps.exe
-
Size
1.0MB
-
MD5
8258fb211075d889b4e3e15458b2a9c5
-
SHA1
6620a898c2899b346ee6a524b09c306775e44706
-
SHA256
b814a4c506ce2dd3920990ecfcb106b7650529be39fe7513373073c5274e62b3
-
SHA512
603cef3ad12ccf092b4cf49315da79f1893775d188c6c7d0015932f9e0ad9030d7871475b7dd202dad0a2198ecde654b73dd819175d2a61c8a64bf32de7693f2
-
SSDEEP
24576:P7QXeEKjLIRwIp8wciIJZou3aF8Sj+1vDXjU/5:jQuEoIG28wcmF8Sj+B/K5
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wps.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wps.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings wps.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3028 WINWORD.EXE 3028 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3028 WINWORD.EXE 3028 WINWORD.EXE 3028 WINWORD.EXE 3028 WINWORD.EXE 3028 WINWORD.EXE 3028 WINWORD.EXE 3028 WINWORD.EXE 3028 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 560 wrote to memory of 3028 560 wps.exe 84 PID 560 wrote to memory of 3028 560 wps.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\wps.exe"C:\Users\Admin\AppData\Local\Temp\wps.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\冠状病毒实时更新:中国正在追踪来自湖北的旅行者.doc" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
713KB
MD5c5b98b77810c5619d20b71791b820529
SHA10c9bcc7e92c9557d4f2072e40af0e5e029d92c15
SHA256fb82f32b9ce1d63cc86ab6ee93b9e619056222af181578d2f8ed38ee6474c092
SHA512e6f16c71d3aefff8789c28b1a8abbcb47680dbdced912f50d318a9037c6f56bfe0a48e5cbf879ef24cecff03a5af937f8ec4b25c8230229730f71c38453da2b4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD5ed950687fdeca4b1a497a4117ad6b34e
SHA1c7525daaccfa3dd1de94bf81ad115864454267cd
SHA256d72c6b50108837687f4b01a579747bc062017c3a6ce54cb3f1cf056e58c1468a
SHA512207a4bf6e8e4131c8442ab608829db50296c4ab98034e6420a5f0a412508684b5a364a578557feb94cf91a3648c9d1dc2b8fef30b7ffefaa293b144a0c86d582