Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 04:00

General

  • Target

    a706215d07d8eebd77c396bb53a2d6afcc2717eb9bfdd9f8c354b6d46157689a.exe

  • Size

    130KB

  • MD5

    b11471389c9db15db9c49af31480ee00

  • SHA1

    ce40b2f6c51ee9906a6490aa760e1c8c91d52843

  • SHA256

    a706215d07d8eebd77c396bb53a2d6afcc2717eb9bfdd9f8c354b6d46157689a

  • SHA512

    3736b82ea602946c6eb6651a59f6dfbda7941e957ec5362930a20fe51cab2514b125b36e05c489fc8c3d8abdac5ab11396f17c4735aa1b2f859b5ebea9e75753

  • SSDEEP

    1536:OfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdj:OVqoCl/YgjxEufVU0TbTyDDalbj

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a706215d07d8eebd77c396bb53a2d6afcc2717eb9bfdd9f8c354b6d46157689a.exe
    "C:\Users\Admin\AppData\Local\Temp\a706215d07d8eebd77c396bb53a2d6afcc2717eb9bfdd9f8c354b6d46157689a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1420
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1996
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1788
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2648
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2728
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:02 /f
            5⤵
            • Creates scheduled task(s)
            PID:2732
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:03 /f
            5⤵
            • Creates scheduled task(s)
            PID:2768
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:04 /f
            5⤵
            • Creates scheduled task(s)
            PID:268
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:2568

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      130KB

      MD5

      c744a455561cf3d2f135f47f118a9764

      SHA1

      cd30f37a55157eb442529e38d439c1000677a10c

      SHA256

      578a352922c67a8f690df1b4c55f50fe3451dee2d368737c498dabee4142240a

      SHA512

      6a1860ad6383e998e5ae5819bce1cdc39fc662fbe424cbb7c6ac5e9edd624e8aadc253144a2f9c3c98b0b79c1d04e848bde9a4d08f47acfbb4eaa9b4b0ce229a

    • \Windows\Resources\spoolsv.exe

      Filesize

      130KB

      MD5

      33bca437cb4f24c02a3461c2ee2d4a90

      SHA1

      91e72133419ca14e27f1247dbc8d3fc49ba9a396

      SHA256

      dd5259304589165a9c2388e67a1b6ecd7f4b00af0ee126f546611e3577a9deff

      SHA512

      92c065b7ae07e7b85948a03fd4a9b05f4b5382b5f11045cadc64a93acf5230de30758b92e5c5eb7f022ae5eca06dcc35d1a2eec00b2028cb315e79b0e665d21a

    • \Windows\Resources\svchost.exe

      Filesize

      130KB

      MD5

      61117efd508aeb179b941bf0acecd373

      SHA1

      5592246a9450d2c7c8b45d859bf5843738ccade9

      SHA256

      5fa797aff6e264e3ec06e64ff1025afe3598d5878d86c5170b0b38ce2ceaa297

      SHA512

      a3eac80a2224c57cd7c26efda10cb0ff40f1899f3e439899e81e2f59f698b6c0a23f89bd0160dc9a139133ea606664395219b451687133ebe1ccf5b4b39cbb5c

    • memory/1420-0-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1420-13-0x00000000002E0000-0x0000000000310000-memory.dmp

      Filesize

      192KB

    • memory/1420-54-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1788-53-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1996-27-0x00000000003C0000-0x00000000003F0000-memory.dmp

      Filesize

      192KB

    • memory/2648-45-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/2728-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB