Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe
Resource
win10v2004-20240508-en
General
-
Target
0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe
-
Size
135KB
-
MD5
130dde846901b9301657e6f10f4b5320
-
SHA1
11e55f65af1bfa54c8e542267f59bc3545b62652
-
SHA256
0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9
-
SHA512
d521f05934159521099cb17401032e396d92990198fd8fbac3455314c9acf15cfb5c5c87cbd590375993de0313b59e0d5437c46a7edd0cae4d218d81ca4b1a66
-
SSDEEP
3072:XVqoCl/YgjxEufVU0TbTyDDaljXcHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH/:XsLqdufVUNDae
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 2096 explorer.exe 1676 spoolsv.exe 2040 svchost.exe 2648 spoolsv.exe -
Loads dropped DLL 4 IoCs
Processes:
0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exeexplorer.exespoolsv.exesvchost.exepid process 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 2096 explorer.exe 1676 spoolsv.exe 2040 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchost.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exeexplorer.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\resources\themes\explorer.exe 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2680 schtasks.exe 1940 schtasks.exe 2280 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exeexplorer.exesvchost.exepid process 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2096 explorer.exe 2096 explorer.exe 2096 explorer.exe 2040 svchost.exe 2040 svchost.exe 2096 explorer.exe 2040 svchost.exe 2096 explorer.exe 2040 svchost.exe 2040 svchost.exe 2096 explorer.exe 2040 svchost.exe 2096 explorer.exe 2040 svchost.exe 2096 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2096 explorer.exe 2040 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe 2096 explorer.exe 2096 explorer.exe 1676 spoolsv.exe 1676 spoolsv.exe 2040 svchost.exe 2040 svchost.exe 2648 spoolsv.exe 2648 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1196 wrote to memory of 2096 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe explorer.exe PID 1196 wrote to memory of 2096 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe explorer.exe PID 1196 wrote to memory of 2096 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe explorer.exe PID 1196 wrote to memory of 2096 1196 0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe explorer.exe PID 2096 wrote to memory of 1676 2096 explorer.exe spoolsv.exe PID 2096 wrote to memory of 1676 2096 explorer.exe spoolsv.exe PID 2096 wrote to memory of 1676 2096 explorer.exe spoolsv.exe PID 2096 wrote to memory of 1676 2096 explorer.exe spoolsv.exe PID 1676 wrote to memory of 2040 1676 spoolsv.exe svchost.exe PID 1676 wrote to memory of 2040 1676 spoolsv.exe svchost.exe PID 1676 wrote to memory of 2040 1676 spoolsv.exe svchost.exe PID 1676 wrote to memory of 2040 1676 spoolsv.exe svchost.exe PID 2040 wrote to memory of 2648 2040 svchost.exe spoolsv.exe PID 2040 wrote to memory of 2648 2040 svchost.exe spoolsv.exe PID 2040 wrote to memory of 2648 2040 svchost.exe spoolsv.exe PID 2040 wrote to memory of 2648 2040 svchost.exe spoolsv.exe PID 2096 wrote to memory of 3016 2096 explorer.exe Explorer.exe PID 2096 wrote to memory of 3016 2096 explorer.exe Explorer.exe PID 2096 wrote to memory of 3016 2096 explorer.exe Explorer.exe PID 2096 wrote to memory of 3016 2096 explorer.exe Explorer.exe PID 2040 wrote to memory of 2680 2040 svchost.exe schtasks.exe PID 2040 wrote to memory of 2680 2040 svchost.exe schtasks.exe PID 2040 wrote to memory of 2680 2040 svchost.exe schtasks.exe PID 2040 wrote to memory of 2680 2040 svchost.exe schtasks.exe PID 2040 wrote to memory of 1940 2040 svchost.exe schtasks.exe PID 2040 wrote to memory of 1940 2040 svchost.exe schtasks.exe PID 2040 wrote to memory of 1940 2040 svchost.exe schtasks.exe PID 2040 wrote to memory of 1940 2040 svchost.exe schtasks.exe PID 2040 wrote to memory of 2280 2040 svchost.exe schtasks.exe PID 2040 wrote to memory of 2280 2040 svchost.exe schtasks.exe PID 2040 wrote to memory of 2280 2040 svchost.exe schtasks.exe PID 2040 wrote to memory of 2280 2040 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe"C:\Users\Admin\AppData\Local\Temp\0451a49e4c5de01bc26fa4fd0d5636c378e9bda0d429137f944234349ef6b3d9.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2648
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:18 /f5⤵
- Creates scheduled task(s)
PID:2680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:19 /f5⤵
- Creates scheduled task(s)
PID:1940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:20 /f5⤵
- Creates scheduled task(s)
PID:2280
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:3016
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5b7554442dd4d1bbd0421918eff7241ce
SHA1b912b53d1510d201a5ba365da2d32f29e3779811
SHA256ed6c378991d07550da5eb67ee5eb9fdca38cc48b6dae8330cf8bf20487886025
SHA512742a5f417a8252807b5d258f25ddb215f2bbfd6a9179fcbd5bd12e5f2c79a7449d72d09c7faab65eff491c094c25cbf761922752aa9002a80b8df3a1fb8c468c
-
Filesize
135KB
MD5184cb94072c4a1a1387e855f21e912d2
SHA17efd7c7b1752ac74bd051b85e1e18b710232e268
SHA256d8f0c015dbbb035612fff50a405a7d5404f2ef0fde60e8da8c810341b539bb1a
SHA512db3b9144f389b7870d9ac96e54ad37954d455fa4c712174018ab63e237245c5e40c6da7ca9954820062ca367a6a971c807f62ed7fe246582cbd273410da482e5
-
Filesize
135KB
MD506fe66d0d7d5e068d228048a9aeaecb5
SHA1dca0615c356710128510d0d6a32e7f131dc0fae2
SHA256460243ab1d7b0756b8cafd3a331bce2b0e40ffe3db522a0b4390cd3b018bfeb6
SHA51260c7a847cc58519a4fac3f8d6aba862e4f32f722a54c4bf1986a2acce2ad9b87ffdec61d7f8972513c3464208be6e18fd3bd7260b7a11af2d2e8282872334e07