Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe
Resource
win10v2004-20240508-en
General
-
Target
6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe
-
Size
135KB
-
MD5
ca061d69d65607eb03c27754d8d537c3
-
SHA1
c9a458371fb943ba4e315a6e2b65c54a4a394bab
-
SHA256
6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e
-
SHA512
93317c9ad055fd72c077fd4baff6f9badfdde8abc970372629a39b592f2dc4f56aaad8b606812e1c27cf84825f9431434a270e1f715308f8f0a30ca266d557cf
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVBB:UVqoCl/YgjxEufVU0TbTyDDal7B
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2600 explorer.exe 612 spoolsv.exe 3332 svchost.exe 1492 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2600 explorer.exe 3332 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 2600 explorer.exe 2600 explorer.exe 612 spoolsv.exe 612 spoolsv.exe 3332 svchost.exe 3332 svchost.exe 1492 spoolsv.exe 1492 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4180 wrote to memory of 2600 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 83 PID 4180 wrote to memory of 2600 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 83 PID 4180 wrote to memory of 2600 4180 6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe 83 PID 2600 wrote to memory of 612 2600 explorer.exe 84 PID 2600 wrote to memory of 612 2600 explorer.exe 84 PID 2600 wrote to memory of 612 2600 explorer.exe 84 PID 612 wrote to memory of 3332 612 spoolsv.exe 85 PID 612 wrote to memory of 3332 612 spoolsv.exe 85 PID 612 wrote to memory of 3332 612 spoolsv.exe 85 PID 3332 wrote to memory of 1492 3332 svchost.exe 86 PID 3332 wrote to memory of 1492 3332 svchost.exe 86 PID 3332 wrote to memory of 1492 3332 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe"C:\Users\Admin\AppData\Local\Temp\6df62f50ef8049a160d111b8aefa9722b3b1aaf34203794f00255fea743f0d9e.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:612 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3332 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD571efa234c0fb6abfa1668d72baf20a44
SHA16a2da987720164c9ce21c28cd516e24cbabd98e3
SHA256afa1e57dce14f96e4a9afdc0f98e8b44c08bd0b36f7706b51680967df5007535
SHA5124bf07397679fcdac3a9848b5bc6217e7d3fc3632aad919f99a9c9252328749998664fb4744484d8f2c6e6a5b70d05c14ba433f00df4d1977c5c476e3069c0c4e
-
Filesize
135KB
MD5824808d4d92914b4d1424c3f532559cc
SHA144ea47dd138131a76aacdcdd5428e6f134d5eae8
SHA256d231eda21026a06c0618232687aab7061130c064af89c6c1f9e107b9edb60290
SHA5122427cbac1804d540bbb29cdc08eca84dd7d51b71ffde1bc881a073d88f40819a9c14c4c05907da1c095856f350a5867b29f14f7be38231f4065f2bec7221eee6
-
Filesize
135KB
MD594512394b9100dd8c1d86e2b478e8280
SHA114d3a494fb9e18e13819c0404fa516f14973ea30
SHA256c02855a5b9c656bded4fe9ee0f2721d8b475b8fde62b4a42684819f20e107446
SHA512f8d6969b16cc07772a44897492157e06c61c6e8b252b3886ab85e6d643848a0a9207c46a9b10e65af341decae1d9841119554efb6c940c48df5502661613d825