Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 02:58
Static task
static1
Behavioral task
behavioral1
Sample
c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe
Resource
win10v2004-20240508-en
General
-
Target
c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe
-
Size
2.6MB
-
MD5
039d97aec80a365a65f937f3d77ccb9a
-
SHA1
ee1be30e5480de1a7a82f0592c113b135b46392e
-
SHA256
c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a
-
SHA512
89a89b7f76cb2c8da99ba176467caefb3bce27f8b88710854399779b3d20b5a25745d376396c6bf3f7af4af556bbb6155dd9bc5b1ed6b1ae941b48b979ae3d01
-
SSDEEP
49152:TeS12nRc6C5CEAHD26ICQVt1ULUQRP6a6YPkCLJ37xbIjNyX5Hxzl/9:6S+c6ZEmqCMtmoQRP6aZtnsNq9l/9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
explorer.exespoolsv.exesvchost.exespoolsv.exepid process 2948 explorer.exe 2728 spoolsv.exe 2672 svchost.exe 2560 spoolsv.exe -
Loads dropped DLL 4 IoCs
Processes:
c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exeexplorer.exespoolsv.exesvchost.exepid process 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 2948 explorer.exe 2728 spoolsv.exe 2672 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
Processes:
explorer.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
Processes:
c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 2948 explorer.exe 2948 explorer.exe 2728 spoolsv.exe 2672 svchost.exe 2560 spoolsv.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exeexplorer.exespoolsv.exedescription ioc process File opened for modification \??\c:\windows\resources\themes\explorer.exe c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1656 schtasks.exe 2908 schtasks.exe 2960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exeexplorer.exesvchost.exepid process 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2672 svchost.exe 2948 explorer.exe 2672 svchost.exe 2672 svchost.exe 2948 explorer.exe 2948 explorer.exe 2672 svchost.exe 2672 svchost.exe 2948 explorer.exe 2948 explorer.exe 2672 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exesvchost.exepid process 2948 explorer.exe 2672 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exeexplorer.exespoolsv.exesvchost.exespoolsv.exepid process 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe 2948 explorer.exe 2948 explorer.exe 2948 explorer.exe 2728 spoolsv.exe 2728 spoolsv.exe 2728 spoolsv.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2560 spoolsv.exe 2560 spoolsv.exe 2560 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exeexplorer.exespoolsv.exesvchost.exedescription pid process target process PID 1992 wrote to memory of 2948 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe explorer.exe PID 1992 wrote to memory of 2948 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe explorer.exe PID 1992 wrote to memory of 2948 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe explorer.exe PID 1992 wrote to memory of 2948 1992 c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe explorer.exe PID 2948 wrote to memory of 2728 2948 explorer.exe spoolsv.exe PID 2948 wrote to memory of 2728 2948 explorer.exe spoolsv.exe PID 2948 wrote to memory of 2728 2948 explorer.exe spoolsv.exe PID 2948 wrote to memory of 2728 2948 explorer.exe spoolsv.exe PID 2728 wrote to memory of 2672 2728 spoolsv.exe svchost.exe PID 2728 wrote to memory of 2672 2728 spoolsv.exe svchost.exe PID 2728 wrote to memory of 2672 2728 spoolsv.exe svchost.exe PID 2728 wrote to memory of 2672 2728 spoolsv.exe svchost.exe PID 2672 wrote to memory of 2560 2672 svchost.exe spoolsv.exe PID 2672 wrote to memory of 2560 2672 svchost.exe spoolsv.exe PID 2672 wrote to memory of 2560 2672 svchost.exe spoolsv.exe PID 2672 wrote to memory of 2560 2672 svchost.exe spoolsv.exe PID 2948 wrote to memory of 2516 2948 explorer.exe Explorer.exe PID 2948 wrote to memory of 2516 2948 explorer.exe Explorer.exe PID 2948 wrote to memory of 2516 2948 explorer.exe Explorer.exe PID 2948 wrote to memory of 2516 2948 explorer.exe Explorer.exe PID 2672 wrote to memory of 1656 2672 svchost.exe schtasks.exe PID 2672 wrote to memory of 1656 2672 svchost.exe schtasks.exe PID 2672 wrote to memory of 1656 2672 svchost.exe schtasks.exe PID 2672 wrote to memory of 1656 2672 svchost.exe schtasks.exe PID 2672 wrote to memory of 2908 2672 svchost.exe schtasks.exe PID 2672 wrote to memory of 2908 2672 svchost.exe schtasks.exe PID 2672 wrote to memory of 2908 2672 svchost.exe schtasks.exe PID 2672 wrote to memory of 2908 2672 svchost.exe schtasks.exe PID 2672 wrote to memory of 2960 2672 svchost.exe schtasks.exe PID 2672 wrote to memory of 2960 2672 svchost.exe schtasks.exe PID 2672 wrote to memory of 2960 2672 svchost.exe schtasks.exe PID 2672 wrote to memory of 2960 2672 svchost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe"C:\Users\Admin\AppData\Local\Temp\c4d58df758c24d568bbb4386a4ca3f4d2463fcfcee5e71ed3304b4b7d916cd9a.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:01 /f5⤵
- Creates scheduled task(s)
PID:1656 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:02 /f5⤵
- Creates scheduled task(s)
PID:2908 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:03 /f5⤵
- Creates scheduled task(s)
PID:2960 -
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2516
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Resources\Themes\explorer.exeFilesize
2.6MB
MD5b573fc8517e09f3615a46c5341373f52
SHA1d8efa6a5fdc71812017f02e007046c1e7e59218e
SHA25621feacf3b3ff96929f8836dc991b2642a71eab1655af74c4ee109a973612ff32
SHA5120f2c881ea231f4309c1156ca30fd7ba47dc55ae4a12cf777b6e054594b76400eb6cb574440bef39e1aaa52f2c50b48f794e0c7904686f1cd10de4270f9670169
-
C:\Windows\Resources\svchost.exeFilesize
2.6MB
MD5f151c7c0665e183eed64ca7affefa868
SHA19c4c5a03f73c62eac0ca0e31334122ba6a0b305e
SHA25615d8e8bb0b8596a39e2be55fe65c5f0be84700a8e4323a3e824b741637966a9e
SHA5122e17931522c7c7706c0d63941b03e5dbf6176cd7e27ad4076a14090b6eb985b154cfd3f94d8cfd062bb915f22ed49ccd4a7691c27714357479eaa803ddf8ba03
-
\Windows\Resources\spoolsv.exeFilesize
2.6MB
MD5e73c3e5ec1768fc3138c1e778beaeafd
SHA1749ebf0d5a287645877beaa137baa99067acba1e
SHA256cee79cef14724eab963493c349f5fe56ce8079ac7101d7f227fef97190844bfa
SHA512094afb25bd534652e6f72dea13c1b2979548db9775c1717c546bc5a33068877477ea8dc066a6b2e2ba36a766a20ab305c1ac3838b3904d049b7676713f37db05
-
memory/1992-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmpFilesize
3.8MB
-
memory/1992-11-0x00000000045C0000-0x0000000004F11000-memory.dmpFilesize
9.3MB
-
memory/1992-0-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/1992-54-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/1992-55-0x000000007EBD0000-0x000000007EFA1000-memory.dmpFilesize
3.8MB
-
memory/2560-50-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2560-44-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-72-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-68-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-47-0x00000000042C0000-0x0000000004C11000-memory.dmpFilesize
9.3MB
-
memory/2672-84-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-82-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-80-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-78-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-76-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-74-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-70-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-57-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-59-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-41-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-62-0x00000000042C0000-0x0000000004C11000-memory.dmpFilesize
9.3MB
-
memory/2672-64-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2672-66-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2728-52-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2728-37-0x0000000004460000-0x0000000004DB1000-memory.dmpFilesize
9.3MB
-
memory/2728-25-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-75-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-16-0x000000007EBD0000-0x000000007EFA1000-memory.dmpFilesize
3.8MB
-
memory/2948-58-0x000000007EBD0000-0x000000007EFA1000-memory.dmpFilesize
3.8MB
-
memory/2948-71-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-13-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-73-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-56-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-65-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-60-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-69-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-77-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-79-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-24-0x0000000004480000-0x0000000004DD1000-memory.dmpFilesize
9.3MB
-
memory/2948-81-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-67-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-83-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-63-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB
-
memory/2948-85-0x0000000000400000-0x0000000000D51000-memory.dmpFilesize
9.3MB