Analysis
-
max time kernel
151s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
103d2f146e25bf5328bcb36707f3d285.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
103d2f146e25bf5328bcb36707f3d285.exe
Resource
win10v2004-20231215-en
General
-
Target
103d2f146e25bf5328bcb36707f3d285.exe
-
Size
2.6MB
-
MD5
103d2f146e25bf5328bcb36707f3d285
-
SHA1
eb01c07d7091ee6fa1a5f8a551344108a9d238c2
-
SHA256
9ae45c6f623e455d0b55df900404a14b5c863c0237bd9090a16ef29234a93e2a
-
SHA512
e1aafcd82a0d797156408955e0357247d93da39b90a50fee1cf670e105f682dd21131f235debce3e2de7c85525c71db0ab984653d791669bd2cd6105dc562a6f
-
SSDEEP
49152:TeS12nRc6C5CEAHD26ICQVt1ULUQRP6a6YPkCLJ37xbIjNyX5Hxzl/C:6S+c6ZEmqCMtmoQRP6aZtnsNq9l/C
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2072 explorer.exe 2500 spoolsv.exe 2804 svchost.exe 2760 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 1732 103d2f146e25bf5328bcb36707f3d285.exe 2072 explorer.exe 2500 spoolsv.exe 2804 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
pid Process 1732 103d2f146e25bf5328bcb36707f3d285.exe 2072 explorer.exe 2500 spoolsv.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 2804 svchost.exe 2072 explorer.exe 2760 spoolsv.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe 2804 svchost.exe 2072 explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 103d2f146e25bf5328bcb36707f3d285.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 444 schtasks.exe 2472 schtasks.exe 2040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2072 explorer.exe 2072 explorer.exe 2804 svchost.exe 2804 svchost.exe 2072 explorer.exe 2072 explorer.exe 2804 svchost.exe 2804 svchost.exe 2072 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2804 svchost.exe 2072 explorer.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 1732 103d2f146e25bf5328bcb36707f3d285.exe 2072 explorer.exe 2072 explorer.exe 2072 explorer.exe 2500 spoolsv.exe 2500 spoolsv.exe 2500 spoolsv.exe 2804 svchost.exe 2804 svchost.exe 2804 svchost.exe 2760 spoolsv.exe 2760 spoolsv.exe 2760 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2072 1732 103d2f146e25bf5328bcb36707f3d285.exe 28 PID 1732 wrote to memory of 2072 1732 103d2f146e25bf5328bcb36707f3d285.exe 28 PID 1732 wrote to memory of 2072 1732 103d2f146e25bf5328bcb36707f3d285.exe 28 PID 1732 wrote to memory of 2072 1732 103d2f146e25bf5328bcb36707f3d285.exe 28 PID 2072 wrote to memory of 2500 2072 explorer.exe 29 PID 2072 wrote to memory of 2500 2072 explorer.exe 29 PID 2072 wrote to memory of 2500 2072 explorer.exe 29 PID 2072 wrote to memory of 2500 2072 explorer.exe 29 PID 2500 wrote to memory of 2804 2500 spoolsv.exe 30 PID 2500 wrote to memory of 2804 2500 spoolsv.exe 30 PID 2500 wrote to memory of 2804 2500 spoolsv.exe 30 PID 2500 wrote to memory of 2804 2500 spoolsv.exe 30 PID 2804 wrote to memory of 2760 2804 svchost.exe 31 PID 2804 wrote to memory of 2760 2804 svchost.exe 31 PID 2804 wrote to memory of 2760 2804 svchost.exe 31 PID 2804 wrote to memory of 2760 2804 svchost.exe 31 PID 2072 wrote to memory of 2580 2072 explorer.exe 32 PID 2072 wrote to memory of 2580 2072 explorer.exe 32 PID 2072 wrote to memory of 2580 2072 explorer.exe 32 PID 2072 wrote to memory of 2580 2072 explorer.exe 32 PID 2804 wrote to memory of 2472 2804 svchost.exe 33 PID 2804 wrote to memory of 2472 2804 svchost.exe 33 PID 2804 wrote to memory of 2472 2804 svchost.exe 33 PID 2804 wrote to memory of 2472 2804 svchost.exe 33 PID 2804 wrote to memory of 2040 2804 svchost.exe 38 PID 2804 wrote to memory of 2040 2804 svchost.exe 38 PID 2804 wrote to memory of 2040 2804 svchost.exe 38 PID 2804 wrote to memory of 2040 2804 svchost.exe 38 PID 2804 wrote to memory of 444 2804 svchost.exe 40 PID 2804 wrote to memory of 444 2804 svchost.exe 40 PID 2804 wrote to memory of 444 2804 svchost.exe 40 PID 2804 wrote to memory of 444 2804 svchost.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\103d2f146e25bf5328bcb36707f3d285.exe"C:\Users\Admin\AppData\Local\Temp\103d2f146e25bf5328bcb36707f3d285.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 14:49 /f5⤵
- Creates scheduled task(s)
PID:2472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 14:50 /f5⤵
- Creates scheduled task(s)
PID:2040
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 14:51 /f5⤵
- Creates scheduled task(s)
PID:444
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD528576a03b73bab152281f92574f137c3
SHA1b629f72c876358176f23c6d05829db6ea110f249
SHA256e3dc494b873d0434d44f4a8434371008f07f9675f357eb23b90176e4f2d1e704
SHA512e0800276fd3eeecb31842f67db39804a847be1ec167394a6f498491acbaebddcb3fdc13a8d5543f97fdf8053d94eca4fcf58de66e0056fb8f0669658bc1a47f5
-
Filesize
1.6MB
MD50effae322793d50101eef65a348e8ff9
SHA1a6b486b81c0d058348cfae87329a8874bb64a2c7
SHA256fc023283fe5fbe7dd3a0c296ed92b32499cbe348d7fd2a4249a6bde462f00dc9
SHA512a523b81357be325cceb78e74cd49ae41d81913dc6776a9d4ba514a67b9ef4eb18edc31be2b9df8472549f65b18d475ee8b403dd2545ea483e9fd80c5942eb4e1
-
Filesize
2.3MB
MD5d23502a62d8d18ecb12d47746a79a897
SHA15b4a87d8b34cac764e75e47afb6d4446e317e8f3
SHA256145998a6ec2115d38d8d273a575ce24ccbeb8d4a49fce55c22eacbeec70d6e48
SHA512d155756ac667ad80520646c6dee27bac0a9b9c31f6702d96a7aa48f989abde53e582ffc2d578ab11e96cb0ce243afc61b30a0113371f8d21d2870838a417955c
-
Filesize
2.0MB
MD5629a371c9aca26338bde237be1fff42c
SHA1bcb7782e0783f5d47247b633a429bba4e944d18c
SHA256f2141e4d216bf3d385729547b0c64962c22bc3654ec5b281e980e0d087653904
SHA512cde82238c878299a6f73f42ba842032c92f10d11c863174574efe268d55b8f987ccf25b334694ee7617b9e33e0bd7a6640bc1b44646eb19b40fb4b547517681f
-
Filesize
2.6MB
MD598fa6567e929f8fd40221744e684984d
SHA12956576b405d009051e826ed01ef3a4cfd8c9adb
SHA2567d1e1ceace8d197b7424f0c74a947a1143a0383998f5ce021cc6cc3f427e4f7a
SHA51241a933e62a8bddaa01072411711f898d86127fff1fb9a4a8e877e87547d501839afc7b7e73c6438c14a1a558fb12b6e4f91bc0b5ad957affad63e37780e3727a
-
Filesize
1.4MB
MD58e5e5976f4fdabe76fbbcedead2c7699
SHA148180fe131f4c08dc945f45ce3a0ff4ef8b453f8
SHA2564144f743dd7e8a20cef20dd20598c0f62abcc0bb08a8c6f2d15bf7c2b081b6f2
SHA512a61a8eb7ee54df5796e1594db708197da3b50c30d4d7f2cc72de938c7f730fc1a93ccbdc519533d9a18fc8a78e4077911194c18ea1051f948981a8e9b61d153c