Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/07/2024, 23:33

General

  • Target

    80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe

  • Size

    135KB

  • MD5

    164be7469fe23a4ad281358cd916e8eb

  • SHA1

    d83fba0bdacf927b8240c6b34b3cf43d34f29fa8

  • SHA256

    80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0

  • SHA512

    df19ede391dba5fd89e1e64dfb1e95cd9402b92e2365428f99f74ad3c18e374c8a397d1c0d5bff2d125a2b4cff84cf05eaeae383b06a8d5c19ecdb8e1a7c9b70

  • SSDEEP

    1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbgTbgq:XVqoCl/YgjxEufVU0TbTyDDalYbgq

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe
    "C:\Users\Admin\AppData\Local\Temp\80e892ab91702866251e337d828d6e194d18745117a3a575611b93521f54f1c0.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1660
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1256
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3676
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2116
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1324

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Resources\Themes\explorer.exe

          Filesize

          135KB

          MD5

          ac79c77c33a2762fc8e9b47064151318

          SHA1

          d3118d6237a6cefd05a8576bf3f08f90e414784e

          SHA256

          afff1647624bf72d9c4d50db2bb6fed2e696504e0deb1ae62f30302467b96476

          SHA512

          3358cea9dffe81bbe56cb5196fd5533c998af8be776357e94ca851e4a98a175ba933c7d185b644af8db4e96e96b5d51a7a7d7b1f12be73eef5ae6e3850ee7153

        • C:\Windows\Resources\spoolsv.exe

          Filesize

          135KB

          MD5

          52364e7b039348d1bd11dbb5894e5027

          SHA1

          7193054e8c4f733d9379416615319c6fc397c3d1

          SHA256

          6681fb88f463c605584f7251b1a58e3c8f564f2b0b2e1bdc2d23dbd91817cd74

          SHA512

          aae9c400b9b8ecec7d0ce6a6fa2df397f58e78f8e7eb2f9f48a8e359ebc247b5c1042ede787de087506e1bca9b7ef6bc4f41e6f4c66ca62203bc7514573f3f5a

        • C:\Windows\Resources\svchost.exe

          Filesize

          135KB

          MD5

          071fd57e0e9d4b713c6cc94bb2e06647

          SHA1

          3d499c15f36d47491b2a5dba2d143dd43c915d1a

          SHA256

          7929d762aa1b43bbda51c85579e9f5a3c450a85f88c278c222cf38e93d10f876

          SHA512

          afe592b1b855e05c974d8b587f2bc71ac9a14ddcdec1dabe3d93d26849fcfffa57cc264847816d3799b7f71a56a9167e16b5a113da3aa66f57a8b3be9da4a7a0

        • memory/1324-33-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1660-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1660-35-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2116-26-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/3676-34-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB