Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
c514d6be438959884519abd5d83a1971.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c514d6be438959884519abd5d83a1971.exe
Resource
win10v2004-20240226-en
General
-
Target
c514d6be438959884519abd5d83a1971.exe
-
Size
2.6MB
-
MD5
c514d6be438959884519abd5d83a1971
-
SHA1
ec0b968c127e88d9a57fd3816684b9ad8502f5b9
-
SHA256
75e06033c5addd275ebd3d5a078d7a36143ab8fd4035864bccfb8e07d53493f2
-
SHA512
e8038cde38e8ba865a92cfb2953431c4d7fbfeddf9d6b90f538d2c10df21d02803e23bf3e6e5de02d1447cba2979c0e6cb671fcca0b3f1a0d74ae359b978e13a
-
SSDEEP
49152:TeS12nRc6C5CEAHD26ICQVt1ULUQRP6a6YPkCLJ37xbIjNyX5Hxzl/e:6S+c6ZEmqCMtmoQRP6aZtnsNq9l/e
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2508 explorer.exe 4956 spoolsv.exe 2020 svchost.exe 2084 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
pid Process 996 c514d6be438959884519abd5d83a1971.exe 2508 explorer.exe 4956 spoolsv.exe 2508 explorer.exe 2020 svchost.exe 2084 spoolsv.exe 996 c514d6be438959884519abd5d83a1971.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe 2020 svchost.exe 2508 explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe c514d6be438959884519abd5d83a1971.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2508 explorer.exe 2020 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 996 c514d6be438959884519abd5d83a1971.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 4956 spoolsv.exe 4956 spoolsv.exe 4956 spoolsv.exe 2020 svchost.exe 2020 svchost.exe 2020 svchost.exe 2084 spoolsv.exe 2084 spoolsv.exe 2084 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 996 wrote to memory of 2508 996 c514d6be438959884519abd5d83a1971.exe 89 PID 996 wrote to memory of 2508 996 c514d6be438959884519abd5d83a1971.exe 89 PID 996 wrote to memory of 2508 996 c514d6be438959884519abd5d83a1971.exe 89 PID 2508 wrote to memory of 4956 2508 explorer.exe 91 PID 2508 wrote to memory of 4956 2508 explorer.exe 91 PID 2508 wrote to memory of 4956 2508 explorer.exe 91 PID 4956 wrote to memory of 2020 4956 spoolsv.exe 92 PID 4956 wrote to memory of 2020 4956 spoolsv.exe 92 PID 4956 wrote to memory of 2020 4956 spoolsv.exe 92 PID 2020 wrote to memory of 2084 2020 svchost.exe 94 PID 2020 wrote to memory of 2084 2020 svchost.exe 94 PID 2020 wrote to memory of 2084 2020 svchost.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c514d6be438959884519abd5d83a1971.exe"C:\Users\Admin\AppData\Local\Temp\c514d6be438959884519abd5d83a1971.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD51e41498070dc397c972cf2413bf12a4c
SHA1ea47343a4582c8b775d3e0714b677f52b61bb208
SHA256ed3034ef6784cfbaa8608473efc1e6531bb6e5ace40316fcf98b4a7e41508fa5
SHA512fc9305fe372a1dd4dc978f96b469adebc55dfada5895f4296867f4968a44132b9c596d91c247c9050901d202c3b85a8eba6a729efe9b08326a897203439f7163
-
Filesize
1.1MB
MD506502e949be85e8787184d070717c3ff
SHA1c65419048a487cee1cbc663c8f6705cbe23796a7
SHA25655930713ded3442a6d90e58dd0ad66ac8b0cc95337fda1bd498b70846c838be0
SHA512ffc2f634600a20f999eced9f95b21e766477452e19ccc8de40d25fc57ccf7285ab5fe4dcc9515e32ec58212f0107d27d77fa7265d7db1c0479555b3830eabaa6
-
Filesize
2.6MB
MD5726886ba0417b5124f535aa80158abb0
SHA1f042ad7be03c8deadee7238ab85a6cca6419f76a
SHA256ff8647d6ca71220e2deb72c0533c2ee5efce53e141d0ba4ad6de5195c09f2514
SHA5122d9a92a4a1c39d907731fb95db8b9ece65c13aba5b2c0c16bc71cc6dc0df12e53a8ce37628d5bd2637ecca86b6edd32bdfde9143c959b0b4c477e84356d1ec9c
-
Filesize
2.6MB
MD53a0e42223f39b8c730d9c6c8734c44b6
SHA166fccb6d5df6e94c9208c109a9a6292ea7e2550e
SHA2565df6f121a335c36eb0306b74c18d69386b8d8c01038e0ea727d932f78f421b73
SHA5125ea0cfff8a461894c48894b1cdcdfbc6347046cf8dfbe9e0fcd43caae353e79851e5e701cd96279026ab3d2ecf0cbd3e1bcceba614644107f8d9d738b5f80403