Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
5c7f604d749f9e5fbfb149155f88c4d0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5c7f604d749f9e5fbfb149155f88c4d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
5c7f604d749f9e5fbfb149155f88c4d0N.exe
-
Size
135KB
-
MD5
5c7f604d749f9e5fbfb149155f88c4d0
-
SHA1
034522e84db17a086a8eee6dddd96163f596e71a
-
SHA256
add7afbb28c137e8f3422b27fb959db3480d4f2b8a96d7875cac12655365331b
-
SHA512
72903ceb151976ca23a6ec0cbeec1023c634ea14eca1985b11f3b335b7bf583437aed5495a0d373bdbbfcf82938ad43e86414e44d74b308dbb0d8f69d2ad356b
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVVKc:UVqoCl/YgjxEufVU0TbTyDDalLKc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2556 explorer.exe 3028 spoolsv.exe 1796 svchost.exe 2280 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 2556 explorer.exe 3028 spoolsv.exe 1796 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 5c7f604d749f9e5fbfb149155f88c4d0N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe 436 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 1796 svchost.exe 1796 svchost.exe 2556 explorer.exe 1796 svchost.exe 1796 svchost.exe 2556 explorer.exe 1796 svchost.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe 2556 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2556 explorer.exe 1796 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 2556 explorer.exe 2556 explorer.exe 3028 spoolsv.exe 3028 spoolsv.exe 1796 svchost.exe 1796 svchost.exe 2280 spoolsv.exe 2280 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2556 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 29 PID 3004 wrote to memory of 2556 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 29 PID 3004 wrote to memory of 2556 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 29 PID 3004 wrote to memory of 2556 3004 5c7f604d749f9e5fbfb149155f88c4d0N.exe 29 PID 2556 wrote to memory of 3028 2556 explorer.exe 30 PID 2556 wrote to memory of 3028 2556 explorer.exe 30 PID 2556 wrote to memory of 3028 2556 explorer.exe 30 PID 2556 wrote to memory of 3028 2556 explorer.exe 30 PID 3028 wrote to memory of 1796 3028 spoolsv.exe 31 PID 3028 wrote to memory of 1796 3028 spoolsv.exe 31 PID 3028 wrote to memory of 1796 3028 spoolsv.exe 31 PID 3028 wrote to memory of 1796 3028 spoolsv.exe 31 PID 1796 wrote to memory of 2280 1796 svchost.exe 32 PID 1796 wrote to memory of 2280 1796 svchost.exe 32 PID 1796 wrote to memory of 2280 1796 svchost.exe 32 PID 1796 wrote to memory of 2280 1796 svchost.exe 32 PID 2556 wrote to memory of 2456 2556 explorer.exe 33 PID 2556 wrote to memory of 2456 2556 explorer.exe 33 PID 2556 wrote to memory of 2456 2556 explorer.exe 33 PID 2556 wrote to memory of 2456 2556 explorer.exe 33 PID 1796 wrote to memory of 2820 1796 svchost.exe 34 PID 1796 wrote to memory of 2820 1796 svchost.exe 34 PID 1796 wrote to memory of 2820 1796 svchost.exe 34 PID 1796 wrote to memory of 2820 1796 svchost.exe 34 PID 1796 wrote to memory of 436 1796 svchost.exe 37 PID 1796 wrote to memory of 436 1796 svchost.exe 37 PID 1796 wrote to memory of 436 1796 svchost.exe 37 PID 1796 wrote to memory of 436 1796 svchost.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c7f604d749f9e5fbfb149155f88c4d0N.exe"C:\Users\Admin\AppData\Local\Temp\5c7f604d749f9e5fbfb149155f88c4d0N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:20 /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2820
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 03:21 /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:436
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2456
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD578aaa424e889b0d652803a64d2af9714
SHA1c7209bbe723c2f0da90707f5b07df543d0272501
SHA256082ab1491598ff2e738943f956319941c1cbc48c7346ab8573daf8a100cbee8d
SHA5128427b5fc1e38d25018749af213afd445a991ea5a26ed4772d3b59fea6b92d422885a4694fd4cb4e09cb0e8c9a4e20e209fc5990cf87c6ff689ced4e6c7b9bfed
-
Filesize
135KB
MD50e36430e06646ed0298aafe746e6c290
SHA13fc085f5a6e89e2fe97f6157649a41ffacac84ba
SHA2568f47348bf3d3132f1cb758c43a185ac0a512980bf8dad27484b8f5f82853e9b4
SHA512da4e6d1eecff3b2cbce8e238d13d1294a1679e7498fa6b73ee0080c689e4d132c73de0ecfd33bc7e407f085effe94644dc6337c774644284196f7425b2d3c31f
-
Filesize
135KB
MD5d5db33cec8b5920f62210101acf27ba7
SHA10978a8d4a560244c52f33316be98c11a4e110c79
SHA256640df4acfec91766a4faca74ea88701a10c28816704ef4adbbf51b7914a700a1
SHA5125a3b369893042c0256fbdc24c147e71bc46c4efad47e4c67461833e3b453afa0fd54579ec2f28d9210b0f7c465d917a3b38170913877759a27eb2a6ffd9a9f72