Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe
Resource
win10v2004-20240508-en
General
-
Target
231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe
-
Size
135KB
-
MD5
8c03873f5e0683f238194cdc3d3dbb31
-
SHA1
945f97c066e2f75bbeda1cf065b0f6f10a6f7f4e
-
SHA256
231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80
-
SHA512
29214cb2a7280593653cf92dcac1d54ee671174ee828d742b90440534bc859029e1e79859ef0b5d050a9d697598c93c20bb12e0efa75521baa8f161c8b15d9b2
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVT+0tr:UVqoCl/YgjxEufVU0TbTyDDal0Sr
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3524 explorer.exe 4032 spoolsv.exe 684 svchost.exe 2120 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe 3524 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3524 explorer.exe 684 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 3524 explorer.exe 3524 explorer.exe 4032 spoolsv.exe 4032 spoolsv.exe 684 svchost.exe 684 svchost.exe 2120 spoolsv.exe 2120 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 736 wrote to memory of 3524 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 83 PID 736 wrote to memory of 3524 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 83 PID 736 wrote to memory of 3524 736 231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe 83 PID 3524 wrote to memory of 4032 3524 explorer.exe 84 PID 3524 wrote to memory of 4032 3524 explorer.exe 84 PID 3524 wrote to memory of 4032 3524 explorer.exe 84 PID 4032 wrote to memory of 684 4032 spoolsv.exe 85 PID 4032 wrote to memory of 684 4032 spoolsv.exe 85 PID 4032 wrote to memory of 684 4032 spoolsv.exe 85 PID 684 wrote to memory of 2120 684 svchost.exe 86 PID 684 wrote to memory of 2120 684 svchost.exe 86 PID 684 wrote to memory of 2120 684 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe"C:\Users\Admin\AppData\Local\Temp\231f51c17fd1b6cca60b3aadc7ea49d7b7ce3d3732811a6cd174ab8d51a11c80.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:736 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3524 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4032 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:684 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2120
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD52b833e5cdfce3d9dbb24f09a07a4214d
SHA1bc8c97bf932e3f376a98862bd07d137a9b0fbadd
SHA256f03e69142ff74de36fd97ff8203c928bacb4f18cfbf8e2b8bb3ff6fbdd91d69b
SHA512827056363c9768b669cb888929fc9d5e6ee5812cc85d6b50fa3c1c608271e0d3f9a3ef273687de7d33d1507962bf8fde40ad4c7c1601519c5564ebc054ae819d
-
Filesize
135KB
MD5d6d3cca5e552d784c0179f1c158712cf
SHA14f253a936cf7f1bc01b0b2bd95215bb665f14e46
SHA256206c331bd8d6159ebb218afb369080da7dfa5021d10c7378f18a268eb462a42f
SHA512e8a119897f183304719d96056e7179394b253536ed6453fab89b4023b4bfede602b600b3a85fcf390c42c1e386ae31bbd7347b4fdcf0973b8e74a1df69af218c
-
Filesize
135KB
MD5f3895c3d3972aa03ac70f57db9b4667e
SHA115a80b107b40bc2a3de10cf8ff26735864f3f34c
SHA2569604615720abc7663f7752ba37378b40ff10a0f74a7bf3b594d045593d42ec09
SHA51276ed3949615b6349cf4c21bd21cccdafc74eafb14d669e14acbc3774177ff1fa7392e967c3396291f97e1e36203021410a9c4fc8bcfe81d730845658f41652aa