Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe
Resource
win10v2004-20240226-en
General
-
Target
219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe
-
Size
3.6MB
-
MD5
04d4f4dcc379f937d8c56e9658c89b44
-
SHA1
44ed1ad394ab480892ba1dd758a960850348ed45
-
SHA256
219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3
-
SHA512
93e8c78914f2ecd028255b6498000cb81af7c99630742990433976fb412a97257ff7b517368245b81d83a02fe68a899a4753379baf7efb38303aab7c0ce914d2
-
SSDEEP
98304:JdByXcdnlLwOrI5Vfeg91hZOhkRpsinj7:Jdien+OrFuBR6c7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2124 explorer.exe 2628 spoolsv.exe 2408 svchost.exe 1972 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2124 explorer.exe 2628 spoolsv.exe 2408 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
pid Process 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2124 explorer.exe 2628 spoolsv.exe 2628 spoolsv.exe 2408 svchost.exe 2408 svchost.exe 1972 spoolsv.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2828 schtasks.exe 1292 schtasks.exe 2028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2408 svchost.exe 2124 explorer.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe 2408 svchost.exe 2124 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2124 explorer.exe 2408 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 2124 explorer.exe 2124 explorer.exe 2124 explorer.exe 2628 spoolsv.exe 2628 spoolsv.exe 2628 spoolsv.exe 2408 svchost.exe 2408 svchost.exe 2408 svchost.exe 1972 spoolsv.exe 1972 spoolsv.exe 1972 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2124 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 28 PID 2740 wrote to memory of 2124 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 28 PID 2740 wrote to memory of 2124 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 28 PID 2740 wrote to memory of 2124 2740 219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe 28 PID 2124 wrote to memory of 2628 2124 explorer.exe 29 PID 2124 wrote to memory of 2628 2124 explorer.exe 29 PID 2124 wrote to memory of 2628 2124 explorer.exe 29 PID 2124 wrote to memory of 2628 2124 explorer.exe 29 PID 2628 wrote to memory of 2408 2628 spoolsv.exe 30 PID 2628 wrote to memory of 2408 2628 spoolsv.exe 30 PID 2628 wrote to memory of 2408 2628 spoolsv.exe 30 PID 2628 wrote to memory of 2408 2628 spoolsv.exe 30 PID 2408 wrote to memory of 1972 2408 svchost.exe 31 PID 2408 wrote to memory of 1972 2408 svchost.exe 31 PID 2408 wrote to memory of 1972 2408 svchost.exe 31 PID 2408 wrote to memory of 1972 2408 svchost.exe 31 PID 2124 wrote to memory of 2440 2124 explorer.exe 32 PID 2124 wrote to memory of 2440 2124 explorer.exe 32 PID 2124 wrote to memory of 2440 2124 explorer.exe 32 PID 2124 wrote to memory of 2440 2124 explorer.exe 32 PID 2408 wrote to memory of 2828 2408 svchost.exe 33 PID 2408 wrote to memory of 2828 2408 svchost.exe 33 PID 2408 wrote to memory of 2828 2408 svchost.exe 33 PID 2408 wrote to memory of 2828 2408 svchost.exe 33 PID 2408 wrote to memory of 1292 2408 svchost.exe 38 PID 2408 wrote to memory of 1292 2408 svchost.exe 38 PID 2408 wrote to memory of 1292 2408 svchost.exe 38 PID 2408 wrote to memory of 1292 2408 svchost.exe 38 PID 2408 wrote to memory of 2028 2408 svchost.exe 40 PID 2408 wrote to memory of 2028 2408 svchost.exe 40 PID 2408 wrote to memory of 2028 2408 svchost.exe 40 PID 2408 wrote to memory of 2028 2408 svchost.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe"C:\Users\Admin\AppData\Local\Temp\219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:32 /f5⤵
- Creates scheduled task(s)
PID:2828
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:33 /f5⤵
- Creates scheduled task(s)
PID:1292
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:34 /f5⤵
- Creates scheduled task(s)
PID:2028
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2440
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5439c68afb0dae7e2cdae73755a3b6da3
SHA10d27370034cf3384dba77201e05b16b9cf9f56c5
SHA2561ed4b1fe8bea316df06d3fff52a42477f05a2d0fdbc95d020b9bda2e334e9696
SHA51298b7ee6738598bf77c77242f841890bec5407ce4b78b37cd194c58dcba75ce17e3e7ce6394e82e5543d8481c9c3a27d42b6340921774e99cd0ccfa5f5b239602
-
Filesize
3.6MB
MD55461a0183195b0309c5410a2c50be516
SHA145b2f9095aed02130a27d610c94eb937aa693734
SHA25676ddd92fedff30912e1c561eee433f6414ad5913c905833472198d01e8f34443
SHA5122ec4c81c2e8da577d692f223068872efa0e2fe581ee0a91b3a923f4cf4f2550156f844ccfdd4f7befc6f41f1645a8e0328ea8107dc5231e1ea32f154dd802d42
-
Filesize
3.6MB
MD523956d6f49bdd9259a7c3f79cb8a0ec7
SHA11e91a0d8783c2448ba735a36af5dd3297485b5a0
SHA256948767eb81805e163c03627bc11cdcb5986865be8fec3d4a1ddcbb555b26e8c5
SHA5125a43bdfec32e5c29defc5f3aa91431fdc55b583d60923e860b3409ce8d15252fcf62250175257b65168751dd800df01630a42466a9eaec318a7d32d935a5516c