Analysis

  • max time kernel
    165s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 01:59

General

  • Target

    e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe

  • Size

    135KB

  • MD5

    1171abbf86f56c323fa9b5e470e96c9b

  • SHA1

    c6f612d3b8b9d5f8245e2b76da10a3ef68833901

  • SHA256

    e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e

  • SHA512

    24924615b6d1b8c3e30ff772851a4c412c3eb73ea58707473533aa49bdcdcecfe0f7aafc7020a0aecd2634d7521fde247d86f2875d80adac0b47a331bc297ae4

  • SSDEEP

    3072:UVqoCl/YgjxEufVU0TbTyDDalQlg77777777777777777777777777777777777q:UsLqdufVUNDax777777777777777777e

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe
    "C:\Users\Admin\AppData\Local\Temp\e5e58ed1c61523b86b65c6792822d8c3228604db806e599db7a2d544f459743e.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:852
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5064
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1580
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4968
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3800
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3808 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      a3365e5b491648e0dc10b002bfa8806e

      SHA1

      4f14f8412359d2725058d9a9e611fe529f4c8f54

      SHA256

      211729c42e64dc73e5176fb6796c2b00a6958d34425a50294c76d0aba1cf236c

      SHA512

      1e2e741a615441ae304e151c810e8fe73d6292332addfd32b7163e974cb17f07850104670af318702def3cb2b947817172de3c792cc1ca21ffd457c146f7a13f

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      27e3546cf5bb3909c3e0c8bae10289cd

      SHA1

      c1d5d68e209fe95031ffd502945b4428f0bda69b

      SHA256

      590d198135c9bbfc8c4225216525db711a48943374e4fd69e7367234da504a17

      SHA512

      2b159ef4e27b7b7f8aa2746bf1f1c9d70fa79c38aa945bd067b60bc795c26de85641b154ee648df33ffaeb78a674835d7af16cf5ae0702718ef8b4885ac8ff79

    • C:\Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      eee3c6e57800f867d2a9010a4416a5f3

      SHA1

      8f62d427d381d1a38abab36506572e82279ba106

      SHA256

      151e1e7a11e919aef85da59afac61cdb99b3bb75e112e474858048ca72edd05a

      SHA512

      ce029ea2a46b1a8d486761f5fd2c32c212d9b086f6d8910071505e9f705bfc9251e5c3899d3a5e14f599821fb5eb4fc44d4a702c0651848c52a03f01e8838f32

    • memory/852-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/852-34-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1580-33-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/3800-32-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB