Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 04:35

General

  • Target

    e38fe3d6ac7b8e0cfe73d0544404f12df5879a070fa50a3bcd32b58d1d6f3165.exe

  • Size

    135KB

  • MD5

    1d6017e309c94ec27a939844bb6e9c86

  • SHA1

    8816f39672c1da0d0fa2b76b9114c014ca6374e9

  • SHA256

    e38fe3d6ac7b8e0cfe73d0544404f12df5879a070fa50a3bcd32b58d1d6f3165

  • SHA512

    d077f682f57b44a58e2ed68f05769d002b27a6ac72b9de5c1c379760566593086044cdd23723e95960a65c57026d27414cf23a0d38e5d5c9e0ee96dc36536e47

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVNX:UVqoCl/YgjxEufVU0TbTyDDalTX

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e38fe3d6ac7b8e0cfe73d0544404f12df5879a070fa50a3bcd32b58d1d6f3165.exe
    "C:\Users\Admin\AppData\Local\Temp\e38fe3d6ac7b8e0cfe73d0544404f12df5879a070fa50a3bcd32b58d1d6f3165.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1068
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2864
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2176
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1272
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2552
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:37 /f
            5⤵
            • Creates scheduled task(s)
            PID:2908
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:38 /f
            5⤵
            • Creates scheduled task(s)
            PID:1736
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 04:39 /f
            5⤵
            • Creates scheduled task(s)
            PID:1156
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:2560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      85a77f792450de128db4017628302eed

      SHA1

      0114f774e918dda7da1c3dd1572efd3142257e27

      SHA256

      d32440419779cf5167cfa30f5427923367af954dc68c4dc98d7de0a16f653992

      SHA512

      348cff381e00fc25bf5db92eb1838f98933d6549eb0317e1c96fb2b0c470fccf4ae803c589ee9e4d783aa77ad51a9ced75b8ee651ce97074dd0a3d5a37a83484

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      bfd84442f0cf6593005ae2e4182e7ce2

      SHA1

      3bbfdd97f33f727be9c5d79b3c5688aa27d43d4f

      SHA256

      7112690b3d5f894d5f71f0625522138a8bb65584bbac36b8788168c1a1908320

      SHA512

      9931e5e4c03d459bab61b6311a0a0b5ce628eb76792fa6bbb28059bf450b7bce167382f6ec20fa33419af84df5a87077e8ca34ccd005d6596c86ded420a94c7b

    • \Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      6dcc3fc25a5819aae4895c15270d722c

      SHA1

      827a3f5c6af14d4630fb831ca3af25d198b344cb

      SHA256

      862cc126d53736de6bdb68a373b6f7db9c3b0e7833cb7347b4b246fc5585f764

      SHA512

      7fd060cd5453056f3fdf3c97432dd07eafdba41f58e0bf1ba57e68444aa8865e0f0ec1f4dd631444b88cd396acdd802eae13d9d81d48718e775c8f28a88d755f

    • memory/1068-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1068-44-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1272-34-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/1272-38-0x0000000000270000-0x000000000028F000-memory.dmp

      Filesize

      124KB

    • memory/2176-43-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2552-42-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2864-18-0x00000000003D0000-0x00000000003EF000-memory.dmp

      Filesize

      124KB