Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/05/2024, 19:30

General

  • Target

    219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe

  • Size

    3.6MB

  • MD5

    04d4f4dcc379f937d8c56e9658c89b44

  • SHA1

    44ed1ad394ab480892ba1dd758a960850348ed45

  • SHA256

    219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3

  • SHA512

    93e8c78914f2ecd028255b6498000cb81af7c99630742990433976fb412a97257ff7b517368245b81d83a02fe68a899a4753379baf7efb38303aab7c0ce914d2

  • SSDEEP

    98304:JdByXcdnlLwOrI5Vfeg91hZOhkRpsinj7:Jdien+OrFuBR6c7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
  • Drops file in Windows directory 4 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe
    "C:\Users\Admin\AppData\Local\Temp\219c5b6971d1ec9f256915f2ff05c4a32412048e6a1744f67f52d5748a18a8d3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2740
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2124
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2628
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2408
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetWindowsHookEx
            PID:1972
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:32 /f
            5⤵
            • Creates scheduled task(s)
            PID:2828
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:33 /f
            5⤵
            • Creates scheduled task(s)
            PID:1292
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 19:34 /f
            5⤵
            • Creates scheduled task(s)
            PID:2028
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:2440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      3.6MB

      MD5

      439c68afb0dae7e2cdae73755a3b6da3

      SHA1

      0d27370034cf3384dba77201e05b16b9cf9f56c5

      SHA256

      1ed4b1fe8bea316df06d3fff52a42477f05a2d0fdbc95d020b9bda2e334e9696

      SHA512

      98b7ee6738598bf77c77242f841890bec5407ce4b78b37cd194c58dcba75ce17e3e7ce6394e82e5543d8481c9c3a27d42b6340921774e99cd0ccfa5f5b239602

    • C:\Windows\Resources\svchost.exe

      Filesize

      3.6MB

      MD5

      5461a0183195b0309c5410a2c50be516

      SHA1

      45b2f9095aed02130a27d610c94eb937aa693734

      SHA256

      76ddd92fedff30912e1c561eee433f6414ad5913c905833472198d01e8f34443

      SHA512

      2ec4c81c2e8da577d692f223068872efa0e2fe581ee0a91b3a923f4cf4f2550156f844ccfdd4f7befc6f41f1645a8e0328ea8107dc5231e1ea32f154dd802d42

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      3.6MB

      MD5

      23956d6f49bdd9259a7c3f79cb8a0ec7

      SHA1

      1e91a0d8783c2448ba735a36af5dd3297485b5a0

      SHA256

      948767eb81805e163c03627bc11cdcb5986865be8fec3d4a1ddcbb555b26e8c5

      SHA512

      5a43bdfec32e5c29defc5f3aa91431fdc55b583d60923e860b3409ce8d15252fcf62250175257b65168751dd800df01630a42466a9eaec318a7d32d935a5516c

    • memory/1972-49-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/1972-44-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-75-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-81-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-23-0x0000000003500000-0x0000000003884000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-12-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-77-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-61-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-73-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-79-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-83-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-71-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-69-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-67-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-55-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-63-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-57-0x0000000003500000-0x0000000003884000-memory.dmp

      Filesize

      3.5MB

    • memory/2124-58-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-59-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-82-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-60-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-62-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-56-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-64-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-66-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-84-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-68-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-36-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-70-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-80-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-72-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-43-0x00000000034B0000-0x0000000003834000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-74-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-78-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2408-76-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2628-27-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2628-35-0x00000000033C0000-0x0000000003744000-memory.dmp

      Filesize

      3.5MB

    • memory/2628-51-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2740-0-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2740-10-0x00000000034B0000-0x0000000003834000-memory.dmp

      Filesize

      3.5MB

    • memory/2740-52-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2740-1-0x0000000077B20000-0x0000000077B21000-memory.dmp

      Filesize

      4KB

    • memory/2740-54-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB