Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/06/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe
Resource
win10v2004-20240508-en
General
-
Target
207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe
-
Size
796KB
-
MD5
ce4c0ef610ccdf05e6da178bbf6fe4ce
-
SHA1
08e02c0bf98773a22a80096ed4770b1501143794
-
SHA256
207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c
-
SHA512
627f29b23527017f87d22a55719852b8b11be27f710d92d05ec88f2622e4621827e824632945db49fe77a469fdc331332280bb282d68bba8ea28e91368fed51c
-
SSDEEP
12288:cFUNDataHc64b888888888888W888888888881bHhYnCbUZRVWPDjxiZl8zAeONW:cFOa486Qb+Cw6r91BoQ9uZUR+zZdA
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 7 IoCs
pid Process 2112 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1640 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.tmp 2980 icsys.icn.exe 3044 explorer.exe 2672 spoolsv.exe 2448 svchost.exe 2468 spoolsv.exe -
Loads dropped DLL 7 IoCs
pid Process 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 2112 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 2980 icsys.icn.exe 3044 explorer.exe 2672 spoolsv.exe 2448 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2220 schtasks.exe 1120 schtasks.exe 2932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 3044 explorer.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe 2448 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3044 explorer.exe 2448 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 2980 icsys.icn.exe 2980 icsys.icn.exe 3044 explorer.exe 3044 explorer.exe 2672 spoolsv.exe 2672 spoolsv.exe 2448 svchost.exe 2448 svchost.exe 2468 spoolsv.exe 2468 spoolsv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2112 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 28 PID 1440 wrote to memory of 2112 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 28 PID 1440 wrote to memory of 2112 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 28 PID 1440 wrote to memory of 2112 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 28 PID 1440 wrote to memory of 2112 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 28 PID 1440 wrote to memory of 2112 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 28 PID 1440 wrote to memory of 2112 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 28 PID 2112 wrote to memory of 1640 2112 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 29 PID 2112 wrote to memory of 1640 2112 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 29 PID 2112 wrote to memory of 1640 2112 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 29 PID 2112 wrote to memory of 1640 2112 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 29 PID 2112 wrote to memory of 1640 2112 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 29 PID 2112 wrote to memory of 1640 2112 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 29 PID 2112 wrote to memory of 1640 2112 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 29 PID 1440 wrote to memory of 2980 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 30 PID 1440 wrote to memory of 2980 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 30 PID 1440 wrote to memory of 2980 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 30 PID 1440 wrote to memory of 2980 1440 207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe 30 PID 2980 wrote to memory of 3044 2980 icsys.icn.exe 31 PID 2980 wrote to memory of 3044 2980 icsys.icn.exe 31 PID 2980 wrote to memory of 3044 2980 icsys.icn.exe 31 PID 2980 wrote to memory of 3044 2980 icsys.icn.exe 31 PID 3044 wrote to memory of 2672 3044 explorer.exe 32 PID 3044 wrote to memory of 2672 3044 explorer.exe 32 PID 3044 wrote to memory of 2672 3044 explorer.exe 32 PID 3044 wrote to memory of 2672 3044 explorer.exe 32 PID 2672 wrote to memory of 2448 2672 spoolsv.exe 33 PID 2672 wrote to memory of 2448 2672 spoolsv.exe 33 PID 2672 wrote to memory of 2448 2672 spoolsv.exe 33 PID 2672 wrote to memory of 2448 2672 spoolsv.exe 33 PID 2448 wrote to memory of 2468 2448 svchost.exe 34 PID 2448 wrote to memory of 2468 2448 svchost.exe 34 PID 2448 wrote to memory of 2468 2448 svchost.exe 34 PID 2448 wrote to memory of 2468 2448 svchost.exe 34 PID 3044 wrote to memory of 2068 3044 explorer.exe 35 PID 3044 wrote to memory of 2068 3044 explorer.exe 35 PID 3044 wrote to memory of 2068 3044 explorer.exe 35 PID 3044 wrote to memory of 2068 3044 explorer.exe 35 PID 2448 wrote to memory of 2932 2448 svchost.exe 36 PID 2448 wrote to memory of 2932 2448 svchost.exe 36 PID 2448 wrote to memory of 2932 2448 svchost.exe 36 PID 2448 wrote to memory of 2932 2448 svchost.exe 36 PID 2448 wrote to memory of 2220 2448 svchost.exe 41 PID 2448 wrote to memory of 2220 2448 svchost.exe 41 PID 2448 wrote to memory of 2220 2448 svchost.exe 41 PID 2448 wrote to memory of 2220 2448 svchost.exe 41 PID 2448 wrote to memory of 1120 2448 svchost.exe 43 PID 2448 wrote to memory of 1120 2448 svchost.exe 43 PID 2448 wrote to memory of 1120 2448 svchost.exe 43 PID 2448 wrote to memory of 1120 2448 svchost.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe"C:\Users\Admin\AppData\Local\Temp\207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
\??\c:\users\admin\appdata\local\temp\207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exec:\users\admin\appdata\local\temp\207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\is-ARO65.tmp\207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.tmp"C:\Users\Admin\AppData\Local\Temp\is-ARO65.tmp\207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.tmp" /SL5="$201F2,274884,121344,c:\users\admin\appdata\local\temp\207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe "3⤵
- Executes dropped EXE
PID:1640
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 20:03 /f6⤵
- Creates scheduled task(s)
PID:2932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 20:04 /f6⤵
- Creates scheduled task(s)
PID:2220
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 20:05 /f6⤵
- Creates scheduled task(s)
PID:1120
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD508aa3956cee6bb7e8c3d16f55071bfc2
SHA16689d95a806ab0978d573b5f68f881624237bfdc
SHA2561cf310ade37fed61fd82b788f1f994586faf0f299761ce60dae75f03ce9d4582
SHA512f2d2529419d8bf81c49bd13eb41eb87b35e0c803998c5da23859be5f4955820dece7afa05b538c5b64daa5f0e5cf90e247741aedeff97f054e4d471962ea122a
-
Filesize
135KB
MD50f73bf0237c2f1f3a510fb463b90f856
SHA1fb32d99e011cfee8009a08d5eeae71bdb393a23a
SHA25641a1d223a2802a6d60af520ba4c04c59d07a25e0dcccf794a8f92e8a793a54a6
SHA5123a734349e481e54da531d22c6aa2e26a69d64378cdfe77c74db658986e23c57d59f397e6f8df37360876ca443241e478e787d7edd542cd178666a20d904e1b2d
-
\Users\Admin\AppData\Local\Temp\207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.exe
Filesize660KB
MD55558797f1b8e4deb484fe06f65f8c6f6
SHA1625cfc1ef58ed7516d58b6510ac6da1d1901230d
SHA25668da490d047c38fd45eadd60d391da71a63a48e4a405160e76ea9e16dff3c66e
SHA5126b56615ac01c8354aac1dbfdd50051ea098d47b7e02194be975ed9755795427a4697888dc40cb44e0dc7938d8d87952c500490734b735af3da035b87a2ac3d13
-
\Users\Admin\AppData\Local\Temp\is-ARO65.tmp\207f6fd23bbcbc87b18e7ca19333af4ec5892c414a995cfea1d87e4082d2e65c.tmp
Filesize1.1MB
MD534acc2bdb45a9c436181426828c4cb49
SHA15adaa1ac822e6128b8d4b59a54d19901880452ae
SHA2569c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07
SHA512134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb
-
Filesize
135KB
MD566d7ae8848f0df8158ed769409c600c7
SHA11f1d65a246a9a43787cd779ff8c286f7f0a809b2
SHA256af5a1cb6163e24c55f81b14db438345b2717a806da9fd757f186fd356bbee5bd
SHA512ee52839b609402d39504e16cfd0b72a3ec33e78f1df7c08561395282cae134263dab9545d929043f059a49f4fecf524a9d716a461b9c71e0f99373ac2706743d
-
Filesize
135KB
MD5df210d78038e14b441da61d382bf239b
SHA17d79cb5ebe511fff60550290c53624fcb59dd574
SHA25617a9fa68dd771ff468ad47e9a120ce07a1434756c7ea991e9f3b2b8ffdbf2f38
SHA512ac63a31460ef0358e8f7beb5d0b3ceb71cfbdfd3106542586feb67b5e66ef7b4d81435fe79e5f986532f6c07e76df08ddbf6a28ce5794c7aa78aca1cce3cc50e