Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
Perm_Tool (1).exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Perm_Tool (1).exe
Resource
win10v2004-20240226-en
General
-
Target
Perm_Tool (1).exe
-
Size
4.5MB
-
MD5
b699fb1e93b8af5c782daef0df8f643a
-
SHA1
22cd3599ee1914d8cacd9f2b2e777c013d853d80
-
SHA256
7be4b480f8901d491a111cfaa52ce2e385e53d40ecf691549124428782cb92ac
-
SHA512
05eff6ce8edf7d04d52134b736aa5bd2fa146b589176282b7c705d0c3bd66f54e21572116d8563f695cf6ea6862a1b46c1ef1267d28e6727bc9b20fe3de7129b
-
SSDEEP
98304:tbKj5g4vHzvT8lKF3eAxFPKJAO11GaNluxLpyLZnjAHMOnyH+:oFNvTekpASmG1w1AHMOA+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 1272 perm_tool (1).exe 3876 icsys.icn.exe 4764 explorer.exe 2728 spoolsv.exe 3960 svchost.exe 2288 spoolsv.exe -
resource yara_rule behavioral2/files/0x0007000000023253-8.dat themida behavioral2/memory/1272-13-0x00007FF79B9D0000-0x00007FF79C52D000-memory.dmp themida -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe Perm_Tool (1).exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe 3876 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4764 explorer.exe 3960 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1504 Perm_Tool (1).exe 1504 Perm_Tool (1).exe 3876 icsys.icn.exe 3876 icsys.icn.exe 4764 explorer.exe 4764 explorer.exe 2728 spoolsv.exe 2728 spoolsv.exe 3960 svchost.exe 3960 svchost.exe 2288 spoolsv.exe 2288 spoolsv.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1272 1504 Perm_Tool (1).exe 92 PID 1504 wrote to memory of 1272 1504 Perm_Tool (1).exe 92 PID 1504 wrote to memory of 3876 1504 Perm_Tool (1).exe 93 PID 1504 wrote to memory of 3876 1504 Perm_Tool (1).exe 93 PID 1504 wrote to memory of 3876 1504 Perm_Tool (1).exe 93 PID 3876 wrote to memory of 4764 3876 icsys.icn.exe 94 PID 3876 wrote to memory of 4764 3876 icsys.icn.exe 94 PID 3876 wrote to memory of 4764 3876 icsys.icn.exe 94 PID 4764 wrote to memory of 2728 4764 explorer.exe 95 PID 4764 wrote to memory of 2728 4764 explorer.exe 95 PID 4764 wrote to memory of 2728 4764 explorer.exe 95 PID 2728 wrote to memory of 3960 2728 spoolsv.exe 96 PID 2728 wrote to memory of 3960 2728 spoolsv.exe 96 PID 2728 wrote to memory of 3960 2728 spoolsv.exe 96 PID 3960 wrote to memory of 2288 3960 svchost.exe 97 PID 3960 wrote to memory of 2288 3960 svchost.exe 97 PID 3960 wrote to memory of 2288 3960 svchost.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Perm_Tool (1).exe"C:\Users\Admin\AppData\Local\Temp\Perm_Tool (1).exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\users\admin\appdata\local\temp\perm_tool (1).exe"c:\users\admin\appdata\local\temp\perm_tool (1).exe "2⤵
- Executes dropped EXE
PID:1272
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3876 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2288
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD585bc2aa04130727ba7faade18f56cda3
SHA1ad03016bbf5b2df71c29e4b624b2a2d6a478defd
SHA2560de12bf43f85f713e6a991d3a6483955612dc4471f7f10e505bb96e73513e010
SHA5120b9f5635576abe071abb798d09550e261296ef6f7efd26cc7d123b320dd1ab7243604528b0dc32178b21a8e5bb74c8e610c4afd407cfadd6c9eb3c19cbd9d8f1
-
Filesize
4.4MB
MD543ba0a572272cb32dd0d9bd1e01f866b
SHA1f6fa7cc413bd866c81d9e53f247d63f890897da4
SHA2569d1718b3f0dbf41760532cf8cea32177a5c81f1ad2e468d55722b4cf5245d1f5
SHA512b8fdcc82479fc650a8e02238c14f0216df46a5a19961c0728f0e76e9a9f96f92eeabca32461bf71be488af72c3d19327724e9c62b057fbaa2ea61713666b7a5b
-
Filesize
135KB
MD552d6556162a9826ad929e2c8d70735bd
SHA1f8210e7a62209da8d5ff80c3bce3771e3c871f7b
SHA2565459ddf38de5c31e8ff5cab20743cb428e412cf2b037e1515a72c4f7a08f4c4e
SHA51221dcf521f849d1c2185d43f08cbfa4e3dc20d298aa2aa38ec42ddf3731cc1ef2c00aff935ffe2464f16ad9e2db4b062078a38f275636f3ff6055b61f01414452
-
Filesize
135KB
MD59f30d9b1483730c8f954a7285ee6f48a
SHA141177caecfc02a279228440d46d7966a7d0ee65e
SHA256ac7cf78b79647050258020444aeef4dc712399a5e05d1f68ca765a2aa5b6d1f7
SHA5126410a5b50e661f1eb838e2972274d3868a5983f196f282553eaa6f13c7cf21d9647b2e271c482c5b598caf01a0054b99ec2344051c9bd776defbb36243d73b3a
-
Filesize
135KB
MD58b08949b37a4e9e1871483f3cd72cb1b
SHA15f799512f9f399a4d237e1079425c6d99261f92e
SHA256b309736ab241712886eb9c9158e2eb7d636a1c02ffdc5faa04b28da9a1f98ed4
SHA512861cd4d5db6deffcac941bb6a86a1a65ddefa0f4b659250161d9bf7b00cd8497919302c1a4f25c1884bc46bbce91721185886ef137772f6301b4ff96039692c8