Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 03:26

General

  • Target

    e0daf2eccf1a9ed4896ff23f003f0cf3d7e68c0bc557bd28c404342663c6d8da.exe

  • Size

    741KB

  • MD5

    8a600850839b4bb88ba6e289c82534e5

  • SHA1

    60a7588f5af5ff552ae3894a91e0ef945cec987d

  • SHA256

    e0daf2eccf1a9ed4896ff23f003f0cf3d7e68c0bc557bd28c404342663c6d8da

  • SHA512

    98db8880cc9c108dd11b4c14dc874c57557fc702f9403be61d93e1f6a46ed542e4afbc9d9983a12d6b30c2af574af14635edd4c3d267cc5ecffffb53024651bd

  • SSDEEP

    12288:ltTuhrf45I8jWtJ8OgL27rd69bk5NCgGhSFB79gYhLIf6EQ9EYcw1FywwwwwwwwR:lIt4kt0Kd6F6CNzYhUiEWEYcwqwwwwwS

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
  • Drops file in Windows directory 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0daf2eccf1a9ed4896ff23f003f0cf3d7e68c0bc557bd28c404342663c6d8da.exe
    "C:\Users\Admin\AppData\Local\Temp\e0daf2eccf1a9ed4896ff23f003f0cf3d7e68c0bc557bd28c404342663c6d8da.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1716
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2596
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2740
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetWindowsHookEx
            PID:3024
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:28 /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2504
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:29 /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1916
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:30 /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1740
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:2732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\svchost.exe

      Filesize

      742KB

      MD5

      bd7802b18d8b8aa0ac5f10755b976361

      SHA1

      9088e756bcb1663a46e4204597db3f8ad4ff0b30

      SHA256

      6c472616c274bbcac01c951427dca9c3c73f9cf45624dbbba3768ea7f598d951

      SHA512

      289236b6c66959b5af2821629282bb10eaf9e5e768f3f5272e0ebcce6ca16f7683d17afed0138303820d4657fd0f5d47a0143cbb26cf189df2024cdcf90f28cf

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      741KB

      MD5

      2187835532e88e7d57d66169d20d4c0f

      SHA1

      cfc6b0f9586f612584dbaf68e11696710f97f96a

      SHA256

      8ed7e0029865b3a36bc12cde36b2d16d5a68f2b4b09cab8d23bc31f403c2dbf0

      SHA512

      2fd7c3dcbf64ac40c1f31bc3e5830dde6a5a7b07db31fb556869624bcfa2f4470353486ab5fea554f82929278b6f6df7fcbc715b7acf6bcf5d76c7b6c86c83a0

    • \Windows\Resources\spoolsv.exe

      Filesize

      742KB

      MD5

      de304949b298db278f5ac4507bd9455c

      SHA1

      1515941009f9e6eec82f084b42c43a4c903b20b7

      SHA256

      5106b7c57ff9605ce581a65b479de5ce5fd634a5016bd4667a82734b4b5ce348

      SHA512

      217ec81d43520ba3d7aa65eda193f9add34676c65f4d7d99a86962182de0edc4a396220d140e02a9655b05cdf9e9c02e8e626e43d7805405aed97d3cbfb9d0a4

    • memory/1716-66-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1716-72-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1716-10-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1716-70-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1716-53-0x0000000003DE0000-0x0000000004152000-memory.dmp

      Filesize

      3.4MB

    • memory/1716-64-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1716-62-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1716-60-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1716-50-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1716-55-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/1716-52-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2236-0-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2236-49-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2596-32-0x0000000003C40000-0x0000000003FB2000-memory.dmp

      Filesize

      3.4MB

    • memory/2596-48-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2596-21-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2740-33-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2740-51-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2740-57-0x0000000003990000-0x0000000003D02000-memory.dmp

      Filesize

      3.4MB

    • memory/2740-56-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2740-61-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2740-54-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2740-63-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2740-65-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/2740-39-0x0000000003990000-0x0000000003D02000-memory.dmp

      Filesize

      3.4MB

    • memory/2740-67-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/3024-46-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB

    • memory/3024-41-0x0000000000400000-0x0000000000772000-memory.dmp

      Filesize

      3.4MB