Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
01b3c37b7e00f0c62aafce1a209e9a81.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01b3c37b7e00f0c62aafce1a209e9a81.exe
Resource
win10v2004-20231215-en
General
-
Target
01b3c37b7e00f0c62aafce1a209e9a81.exe
-
Size
135KB
-
MD5
01b3c37b7e00f0c62aafce1a209e9a81
-
SHA1
e66bdfdd8b5ff95ef773d6620e6527f0a7b8fb1d
-
SHA256
39c30060191d8b1f133abd6281046714754444a3217de25f7ff2627e8c236311
-
SHA512
50d7073241dad2afb554e595c6121b4eacedb94644a9b4329e99eee4c3c81d8f0425872bb9d69f7a2f233b3b655da853e183b96be44fb6fbe24cb06f021e1dae
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVXh:UVqoCl/YgjxEufVU0TbTyDDalRh
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 220 explorer.exe 3344 spoolsv.exe 100 svchost.exe 4324 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 01b3c37b7e00f0c62aafce1a209e9a81.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe 220 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 220 explorer.exe 100 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 220 explorer.exe 220 explorer.exe 3344 spoolsv.exe 3344 spoolsv.exe 100 svchost.exe 100 svchost.exe 4324 spoolsv.exe 4324 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3672 wrote to memory of 220 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 23 PID 3672 wrote to memory of 220 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 23 PID 3672 wrote to memory of 220 3672 01b3c37b7e00f0c62aafce1a209e9a81.exe 23 PID 220 wrote to memory of 3344 220 explorer.exe 22 PID 220 wrote to memory of 3344 220 explorer.exe 22 PID 220 wrote to memory of 3344 220 explorer.exe 22 PID 3344 wrote to memory of 100 3344 spoolsv.exe 21 PID 3344 wrote to memory of 100 3344 spoolsv.exe 21 PID 3344 wrote to memory of 100 3344 spoolsv.exe 21 PID 100 wrote to memory of 4324 100 svchost.exe 20 PID 100 wrote to memory of 4324 100 svchost.exe 20 PID 100 wrote to memory of 4324 100 svchost.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\01b3c37b7e00f0c62aafce1a209e9a81.exe"C:\Users\Admin\AppData\Local\Temp\01b3c37b7e00f0c62aafce1a209e9a81.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220
-
-
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4324
-
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe1⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:100
-
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5557db832d04023abb4ebd7d955eacd3e
SHA11189ac2ee1b8121fbb2a85a6536710d54502df38
SHA25627aa616a926b9de8b42f39d903fd6634484311850f6bd3cb40a527f51b3aefc2
SHA512c0cd7511d89b4e44a817214ea79f7501abaf26b892519e136808e12835161be8cb80bea8806e52e5d7cee041bca21c72c8628cacc32d730dd61808433d16a03a
-
Filesize
135KB
MD50c97910a23129ed312454937519c9fd7
SHA152fb6738f5452bc21a97151b422685a40afccd6f
SHA2567245c4fbe33ee73dc397c9e99a3331147c6cf0d8d082a343a60dc2846763b2d1
SHA5127cb68aa5c9c7cfd876249dc5925cee888ffa7bb4c645a220f1f1f336a46ed3536fed8b0b4551575adc5978d3e6dda881e8457aad03b2aba1577b9b2b9591d87b