Analysis
-
max time kernel
165s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe
Resource
win10v2004-20240226-en
General
-
Target
e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe
-
Size
135KB
-
MD5
1171abbf86f56c323fa9b5e470e96c9b
-
SHA1
c6f612d3b8b9d5f8245e2b76da10a3ef68833901
-
SHA256
e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e
-
SHA512
24924615b6d1b8c3e30ff772851a4c412c3eb73ea58707473533aa49bdcdcecfe0f7aafc7020a0aecd2634d7521fde247d86f2875d80adac0b47a331bc297ae4
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalQlg77777777777777777777777777777777777q:UsLqdufVUNDax777777777777777777e
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 5064 explorer.exe 1580 spoolsv.exe 4968 svchost.exe 3800 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe 5064 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5064 explorer.exe 4968 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 5064 explorer.exe 5064 explorer.exe 1580 spoolsv.exe 1580 spoolsv.exe 4968 svchost.exe 4968 svchost.exe 3800 spoolsv.exe 3800 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 852 wrote to memory of 5064 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 99 PID 852 wrote to memory of 5064 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 99 PID 852 wrote to memory of 5064 852 e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe 99 PID 5064 wrote to memory of 1580 5064 explorer.exe 100 PID 5064 wrote to memory of 1580 5064 explorer.exe 100 PID 5064 wrote to memory of 1580 5064 explorer.exe 100 PID 1580 wrote to memory of 4968 1580 spoolsv.exe 101 PID 1580 wrote to memory of 4968 1580 spoolsv.exe 101 PID 1580 wrote to memory of 4968 1580 spoolsv.exe 101 PID 4968 wrote to memory of 3800 4968 svchost.exe 102 PID 4968 wrote to memory of 3800 4968 svchost.exe 102 PID 4968 wrote to memory of 3800 4968 svchost.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe"C:\Users\Admin\AppData\Local\Temp\e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3800
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3808 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:1608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5a3365e5b491648e0dc10b002bfa8806e
SHA14f14f8412359d2725058d9a9e611fe529f4c8f54
SHA256211729c42e64dc73e5176fb6796c2b00a6958d34425a50294c76d0aba1cf236c
SHA5121e2e741a615441ae304e151c810e8fe73d6292332addfd32b7163e974cb17f07850104670af318702def3cb2b947817172de3c792cc1ca21ffd457c146f7a13f
-
Filesize
135KB
MD527e3546cf5bb3909c3e0c8bae10289cd
SHA1c1d5d68e209fe95031ffd502945b4428f0bda69b
SHA256590d198135c9bbfc8c4225216525db711a48943374e4fd69e7367234da504a17
SHA5122b159ef4e27b7b7f8aa2746bf1f1c9d70fa79c38aa945bd067b60bc795c26de85641b154ee648df33ffaeb78a674835d7af16cf5ae0702718ef8b4885ac8ff79
-
Filesize
135KB
MD5eee3c6e57800f867d2a9010a4416a5f3
SHA18f62d427d381d1a38abab36506572e82279ba106
SHA256151e1e7a11e919aef85da59afac61cdb99b3bb75e112e474858048ca72edd05a
SHA512ce029ea2a46b1a8d486761f5fd2c32c212d9b086f6d8910071505e9f705bfc9251e5c3899d3a5e14f599821fb5eb4fc44d4a702c0651848c52a03f01e8838f32