Analysis
-
max time kernel
11s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
4f4cefde786d2d2fe0f061cfcceca68f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4f4cefde786d2d2fe0f061cfcceca68f.exe
Resource
win10v2004-20231215-en
General
-
Target
4f4cefde786d2d2fe0f061cfcceca68f.exe
-
Size
4.1MB
-
MD5
4f4cefde786d2d2fe0f061cfcceca68f
-
SHA1
1f1371328250d3857500b5c8a727aa676e1c95f5
-
SHA256
d8450b72d767c68655bc4e8482f3b887f3e68b5643127a6836e84a11e4082161
-
SHA512
313b48009362960ce9745021006ddbdaacd9b3699f0289bc7bf124d74b0a9cd7571d10d7dce5677dda494ea6f476a82f73f72d3c2657e22894797b00f3ea790d
-
SSDEEP
49152:ISlNHydXboE+2pKWTvP6p9kB/GS0fsXCFzSlNHydXboE+2pKWTvP6p9kB/GS0fsR:ISjydNCYn0+WSjydNCYn0+B
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoolsv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4f4cefde786d2d2fe0f061cfcceca68f.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoolsv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f4cefde786d2d2fe0f061cfcceca68f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f4cefde786d2d2fe0f061cfcceca68f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoolsv.exe -
Executes dropped EXE 4 IoCs
pid Process 2608 explorer.exe 2088 spoolsv.exe 2696 svchost.exe 2312 spoolsv.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine 4f4cefde786d2d2fe0f061cfcceca68f.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine spoolsv.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine svchost.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 2608 explorer.exe 2608 explorer.exe 2088 spoolsv.exe 2088 spoolsv.exe 2696 svchost.exe 2696 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 2608 explorer.exe 2088 spoolsv.exe 2696 svchost.exe 2312 spoolsv.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 4f4cefde786d2d2fe0f061cfcceca68f.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 988 schtasks.exe 1936 schtasks.exe 704 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2088 spoolsv.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2312 spoolsv.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2608 explorer.exe 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe 2608 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2608 explorer.exe 2696 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 2608 explorer.exe 2608 explorer.exe 2088 spoolsv.exe 2088 spoolsv.exe 2696 svchost.exe 2696 svchost.exe 2312 spoolsv.exe 2312 spoolsv.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1108 wrote to memory of 2608 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 28 PID 1108 wrote to memory of 2608 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 28 PID 1108 wrote to memory of 2608 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 28 PID 1108 wrote to memory of 2608 1108 4f4cefde786d2d2fe0f061cfcceca68f.exe 28 PID 2608 wrote to memory of 2088 2608 explorer.exe 29 PID 2608 wrote to memory of 2088 2608 explorer.exe 29 PID 2608 wrote to memory of 2088 2608 explorer.exe 29 PID 2608 wrote to memory of 2088 2608 explorer.exe 29 PID 2088 wrote to memory of 2696 2088 spoolsv.exe 30 PID 2088 wrote to memory of 2696 2088 spoolsv.exe 30 PID 2088 wrote to memory of 2696 2088 spoolsv.exe 30 PID 2088 wrote to memory of 2696 2088 spoolsv.exe 30 PID 2696 wrote to memory of 2312 2696 svchost.exe 31 PID 2696 wrote to memory of 2312 2696 svchost.exe 31 PID 2696 wrote to memory of 2312 2696 svchost.exe 31 PID 2696 wrote to memory of 2312 2696 svchost.exe 31 PID 2608 wrote to memory of 2404 2608 explorer.exe 32 PID 2608 wrote to memory of 2404 2608 explorer.exe 32 PID 2608 wrote to memory of 2404 2608 explorer.exe 32 PID 2608 wrote to memory of 2404 2608 explorer.exe 32 PID 2696 wrote to memory of 988 2696 svchost.exe 34 PID 2696 wrote to memory of 988 2696 svchost.exe 34 PID 2696 wrote to memory of 988 2696 svchost.exe 34 PID 2696 wrote to memory of 988 2696 svchost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f4cefde786d2d2fe0f061cfcceca68f.exe"C:\Users\Admin\AppData\Local\Temp\4f4cefde786d2d2fe0f061cfcceca68f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:11 /f5⤵
- Creates scheduled task(s)
PID:988
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:12 /f5⤵
- Creates scheduled task(s)
PID:1936
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:13 /f5⤵
- Creates scheduled task(s)
PID:704
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2404
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD524eb110d2bf5eafb85b718dbbc6309de
SHA1e0c47730604c1cbe6582934e9cae1ca426156aea
SHA2567b0a41b258cdd46867db0340b469fb3b74ec53dedf11a79fd43c238406a3eb27
SHA512609e890be8039e08b5fa1093939d21645b224d31a0fa589f99f2c2eb057dd6a13d9851e2536a65c1d4d3e7729f312054412c81142ecf7c078be26bea47aaa7e8
-
Filesize
132KB
MD55d0944d23fbfe0c4420aa4e09215ee8c
SHA114d367f301940c0c8c4d445ceffd2ad3cab9d237
SHA256f9f2875032d1920e55de755bfc3f19d61ecbec42cc9caa0616a6e3d32f0e72df
SHA512e49f0209dd69f409d79d1c116320b44221a1228176313822d8b6f49abb0f4b24c07ee0022d41e808d45c879bfc6fdcd34032b5255995a2895c59e4ecd2b60666
-
Filesize
40KB
MD5ae9a51a205eab49b42c523d1009f2058
SHA1697b93160bcd76793bc75b8158e307b960d92ac3
SHA256ccd87c30269d41e36683f0aefe8bf479e6a21c40e85fc8a777b40e201e8e1487
SHA512efd06a924267e3a996e6f93f5c3c68785b378ab54b8a29effab7ddd4c067e21953b09f991fc8668218fce809217bfeb3104725b25d41c91c57b70165a1e37540
-
Filesize
85KB
MD57f8d45ad2b5ea0073bb8ba16acc0db00
SHA19a2cbdc664bbfcd950b9bc74d7d9a146309e7fa5
SHA25693eb64b0e8a01e36ee6107d77900995c606ed580c99ce09f7dc8fc589379bff1
SHA512f7d649a950ffca34c862383a1ebdc31375a790a12146e94dda6f0ba40ecf08fcbaf91a9759856868e5a61a98bf3cf4ae5f8f2738f1f0f749ba0f3eaca07ed003
-
Filesize
50KB
MD5c1d273dcdc9a69b7667810df16166a23
SHA1034a8d1a9160ce5635edc4675fdc0537e46e728e
SHA256c8a3122c69deadca5b4fb94f3fbef0d52ddf428bdc134dc66d7a30495c023611
SHA51265e0fd2b75a2526344286052243e1407d0fb2fd5a3106823e82fa6fa5164c956f19086611457624b9656a59b0d17e5bb94dd26e3723085a500c076db3d00acf5
-
Filesize
152KB
MD5badf9d93158b89f4182ac949abf2ec85
SHA177f29d1767dd4926b8bf28356ac28fec49feed05
SHA25618df3601fcf279717719f312dac0565fa7c086546011208207adc8ddbba19fca
SHA512d27054452d3a317e57650e12db1015e93da15b2c85a640a26e44038d80179fabfade6f0862e0b42db4dfa4f8f7bd313d798703894536652f9f1975aeaed8edd3
-
Filesize
99KB
MD5b227fdc28a304b5486cfa021835cfcfe
SHA192bc99f9134574ad97a41d57b72bdcced9c19f60
SHA256ed9ac2c8eacd47afa1a47f9429cdee3bc473b4c690f97f8c82e2ffcc1a894db9
SHA5123d04b86db7822ecc0bbd2a9b0f50731e83ff6064dab5ae3d00340511fdfd25788d61bbf21cec9fd579200f6069b8ac92da6d0ac8f4ad3968d4133aebd547429a
-
Filesize
25KB
MD539b9be702cbe1275f6b5a22650b798a3
SHA18338a51152eaa7e6ce728aea087863182172b591
SHA25643d9f01bfef7383f97c2e3e657efb9a5b2a7dabd5b816cd0ec07d808f9d64402
SHA512b886aae10f70447fafdcdace56aa80610f52bf8ccbe32d8f1f0475a35e096dfce19551168140d6fe9040b2b47427fb6818a1824b55b54fe8a849281d8cce871e
-
Filesize
89KB
MD57a0dcb69d869adb17dbacdcb6d2283a4
SHA123dec13e1af7b4e985c15779decb4f280b4d18e5
SHA2569b89547c068f75be12abce23160ee22b81dcb93b08e1d9eac365534faef4c975
SHA512a494f0d43efd83f9a8893d2d3237b25781abca4c5167a8c1fa9851394f28c179dc6cd23dec39b9d44718aced2b205aebae6a2926ee3ab905d1ed5e26d1d41652
-
Filesize
95KB
MD5039fdf3c7350d5d69629c44e43210864
SHA1b2ef22881e2be86a44200c7c262f15fdf08da4bf
SHA256de8b4bf807d1605c9602677ae092e46e3ea63c084e43828a9f83edb8cd02acda
SHA5122e112f37650899cb6dd364a835e613b2351f8c4a08aa69f363b3046971bf9b4767846b6a29957abafb3ba8829ac2d145e7fd19bfd7c5dcbe0fb43214ce489ffb
-
Filesize
62KB
MD5095478407cf7a1ad158d99aebe2f674a
SHA17182998e29e3be8677bf69dd8c4a5e6728abc135
SHA2567591639f2d505a720e0d03cf65b7570218443ba041a23193aae7b0055886e32a
SHA51255c497ad3a1cc497a9d1a19fb5fad84290248a9b64092fce9fda0011816418021724c79d56e217c54ae8b76cf9297c3287b4c173e77f9ebdafa7cf9d04ccf230
-
Filesize
34KB
MD5d150bb1afcf0349202aedc28e2cbf656
SHA1ee7d277027284b18c36c111ba1aed896021c9f24
SHA256d06a6f871168e44cbfbd1514d059f1872dc214578c5e15d880a07c3b0d3c8ba0
SHA512463325027eeb016e3c9376c78520d9fe3929420123519f18b2513fa79bc4ecbd8292f2694658b2f0ddc01f6372f5683205ef8654f56765a223f8aac08f112757
-
Filesize
97KB
MD583d5311695ccf4f87b908dc6639dea6e
SHA17e002b246a54e43df3c944ab118d570c6af358cc
SHA25610806c5f4475b47064531a0b2e78787aec077803934f306befd899ab084e55ab
SHA5127db64ac31c1dd7176819f8e677ed0d421e6e18ce76158571e0f3e74736eb0495eb506878bf436106b6ef6d40578c36a9d063773869cc55052fb3d72372ddee17
-
Filesize
64KB
MD564797ea8bc15bdae155eb950d934bc30
SHA118f9096dee8276ecd1d71602df0812271083fe8f
SHA25618f5b7b5c9452d4842701caf19354654933cae4ec382a169a5f78de77546b866
SHA512de89cb03f798c03c1db9cbc99161fcb56c4e4a161fedecbf7c545553a10278945b62351abd4561cf5f2d50143f69e12f038a7398caba9237611e377924fc72b4
-
Filesize
77KB
MD5881f118cc76e536bb661c1d0339b8822
SHA1690ae4d5980e19c782b742d3d231ca9117a9d713
SHA2563dbc21544bf9b907a93fec05b0dbf183e431ca3af0e647ba87c1cb1e470991ae
SHA512c52c133dd7f58eb2e65196b55140735850317f7f4857021ed688ea010726a38d0798a7f0801b24a710e8baa86b22ffb8e199a309398bf6532d2a94973a0d45d5
-
Filesize
102KB
MD5289db0047e92f6591af32b311c3c1097
SHA1777038e6ac601b02b16311bb398dcd48d61b5b3b
SHA256080c50282288b9a05aa4bf8ee3ab6c4ef83407ee81a157e9bdf89e26ea24e8da
SHA512ecaeb0b2335580e876ea7e96eb7bb77478d76da602af9577ae189393e50909c1d09b9f81801e25905f4402de8a89bf20509f4697c3b38aec2ab30f484ee1874c