Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe
Resource
win10v2004-20240704-en
General
-
Target
80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe
-
Size
135KB
-
MD5
164be7469fe23a4ad281358cd916e8eb
-
SHA1
d83fba0bdacf927b8240c6b34b3cf43d34f29fa8
-
SHA256
80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0
-
SHA512
df19ede391dba5fd89e1e64dfb1e95cd9402b92e2365428f99f74ad3c18e374c8a397d1c0d5bff2d125a2b4cff84cf05eaeae383b06a8d5c19ecdb8e1a7c9b70
-
SSDEEP
1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbgTbgq:XVqoCl/YgjxEufVU0TbTyDDalYbgq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1256 explorer.exe 3676 spoolsv.exe 2116 svchost.exe 1324 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe 1256 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1256 explorer.exe 2116 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 1256 explorer.exe 1256 explorer.exe 3676 spoolsv.exe 3676 spoolsv.exe 2116 svchost.exe 2116 svchost.exe 1324 spoolsv.exe 1324 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1256 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 84 PID 1660 wrote to memory of 1256 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 84 PID 1660 wrote to memory of 1256 1660 80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe 84 PID 1256 wrote to memory of 3676 1256 explorer.exe 85 PID 1256 wrote to memory of 3676 1256 explorer.exe 85 PID 1256 wrote to memory of 3676 1256 explorer.exe 85 PID 3676 wrote to memory of 2116 3676 spoolsv.exe 86 PID 3676 wrote to memory of 2116 3676 spoolsv.exe 86 PID 3676 wrote to memory of 2116 3676 spoolsv.exe 86 PID 2116 wrote to memory of 1324 2116 svchost.exe 88 PID 2116 wrote to memory of 1324 2116 svchost.exe 88 PID 2116 wrote to memory of 1324 2116 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe"C:\Users\Admin\AppData\Local\Temp\80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5ac79c77c33a2762fc8e9b47064151318
SHA1d3118d6237a6cefd05a8576bf3f08f90e414784e
SHA256afff1647624bf72d9c4d50db2bb6fed2e696504e0deb1ae62f30302467b96476
SHA5123358cea9dffe81bbe56cb5196fd5533c998af8be776357e94ca851e4a98a175ba933c7d185b644af8db4e96e96b5d51a7a7d7b1f12be73eef5ae6e3850ee7153
-
Filesize
135KB
MD552364e7b039348d1bd11dbb5894e5027
SHA17193054e8c4f733d9379416615319c6fc397c3d1
SHA2566681fb88f463c605584f7251b1a58e3c8f564f2b0b2e1bdc2d23dbd91817cd74
SHA512aae9c400b9b8ecec7d0ce6a6fa2df397f58e78f8e7eb2f9f48a8e359ebc247b5c1042ede787de087506e1bca9b7ef6bc4f41e6f4c66ca62203bc7514573f3f5a
-
Filesize
135KB
MD5071fd57e0e9d4b713c6cc94bb2e06647
SHA13d499c15f36d47491b2a5dba2d143dd43c915d1a
SHA2567929d762aa1b43bbda51c85579e9f5a3c450a85f88c278c222cf38e93d10f876
SHA512afe592b1b855e05c974d8b587f2bc71ac9a14ddcdec1dabe3d93d26849fcfffa57cc264847816d3799b7f71a56a9167e16b5a113da3aa66f57a8b3be9da4a7a0