Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
66f0d151d9994cc5811c746d48265e60N.exe
Resource
win7-20240708-en
General
-
Target
66f0d151d9994cc5811c746d48265e60N.exe
-
Size
3.2MB
-
MD5
66f0d151d9994cc5811c746d48265e60
-
SHA1
455ad3c941653dbfd4b0727527d67344dcf96865
-
SHA256
8b097b6ebfe177d49434f4d632ce912792d52c149f431dd51c8e8631110abefa
-
SHA512
f54b4a99782fda97530d79fb48776d8b3641d530c31c0fd2ac327ba6fbaf899bb3d39cc3b57a1973b63596ea59b1ddec8999f03705b0fd2ccac3f5b627f23bfe
-
SSDEEP
49152:t5NbfJJb4/WGdvbKJJb4/WGBJJb4/WGwJJb4/WGA0wr+jTZtaZ3Otfj7UCLiJJes:1XbbG5mbbGVbbGobbGABr+dCe6GU
Malware Config
Signatures
-
Detected Ploutus loader 1 IoCs
resource yara_rule behavioral1/files/0x00060000000191ad-6.dat family_ploutus -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 2232 66f0d151d9994cc5811c746d48265e60n.exe 2736 icsys.icn.exe 2620 explorer.exe 320 spoolsv.exe 1624 svchost.exe 2836 spoolsv.exe -
Loads dropped DLL 12 IoCs
pid Process 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2736 icsys.icn.exe 2620 explorer.exe 320 spoolsv.exe 1624 svchost.exe 2232 66f0d151d9994cc5811c746d48265e60n.exe 2232 66f0d151d9994cc5811c746d48265e60n.exe 2232 66f0d151d9994cc5811c746d48265e60n.exe 2232 66f0d151d9994cc5811c746d48265e60n.exe 2232 66f0d151d9994cc5811c746d48265e60n.exe 2232 66f0d151d9994cc5811c746d48265e60n.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 66f0d151d9994cc5811c746d48265e60N.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66f0d151d9994cc5811c746d48265e60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66f0d151d9994cc5811c746d48265e60n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2700 schtasks.exe 1316 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 2620 explorer.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2620 explorer.exe 1624 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 66f0d151d9994cc5811c746d48265e60n.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2232 66f0d151d9994cc5811c746d48265e60n.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2032 66f0d151d9994cc5811c746d48265e60N.exe 2032 66f0d151d9994cc5811c746d48265e60N.exe 2232 66f0d151d9994cc5811c746d48265e60n.exe 2736 icsys.icn.exe 2736 icsys.icn.exe 2620 explorer.exe 2620 explorer.exe 320 spoolsv.exe 320 spoolsv.exe 1624 svchost.exe 1624 svchost.exe 2836 spoolsv.exe 2836 spoolsv.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2232 2032 66f0d151d9994cc5811c746d48265e60N.exe 30 PID 2032 wrote to memory of 2232 2032 66f0d151d9994cc5811c746d48265e60N.exe 30 PID 2032 wrote to memory of 2232 2032 66f0d151d9994cc5811c746d48265e60N.exe 30 PID 2032 wrote to memory of 2232 2032 66f0d151d9994cc5811c746d48265e60N.exe 30 PID 2032 wrote to memory of 2736 2032 66f0d151d9994cc5811c746d48265e60N.exe 31 PID 2032 wrote to memory of 2736 2032 66f0d151d9994cc5811c746d48265e60N.exe 31 PID 2032 wrote to memory of 2736 2032 66f0d151d9994cc5811c746d48265e60N.exe 31 PID 2032 wrote to memory of 2736 2032 66f0d151d9994cc5811c746d48265e60N.exe 31 PID 2736 wrote to memory of 2620 2736 icsys.icn.exe 32 PID 2736 wrote to memory of 2620 2736 icsys.icn.exe 32 PID 2736 wrote to memory of 2620 2736 icsys.icn.exe 32 PID 2736 wrote to memory of 2620 2736 icsys.icn.exe 32 PID 2620 wrote to memory of 320 2620 explorer.exe 33 PID 2620 wrote to memory of 320 2620 explorer.exe 33 PID 2620 wrote to memory of 320 2620 explorer.exe 33 PID 2620 wrote to memory of 320 2620 explorer.exe 33 PID 320 wrote to memory of 1624 320 spoolsv.exe 34 PID 320 wrote to memory of 1624 320 spoolsv.exe 34 PID 320 wrote to memory of 1624 320 spoolsv.exe 34 PID 320 wrote to memory of 1624 320 spoolsv.exe 34 PID 1624 wrote to memory of 2836 1624 svchost.exe 35 PID 1624 wrote to memory of 2836 1624 svchost.exe 35 PID 1624 wrote to memory of 2836 1624 svchost.exe 35 PID 1624 wrote to memory of 2836 1624 svchost.exe 35 PID 2620 wrote to memory of 2588 2620 explorer.exe 36 PID 2620 wrote to memory of 2588 2620 explorer.exe 36 PID 2620 wrote to memory of 2588 2620 explorer.exe 36 PID 2620 wrote to memory of 2588 2620 explorer.exe 36 PID 1624 wrote to memory of 2700 1624 svchost.exe 37 PID 1624 wrote to memory of 2700 1624 svchost.exe 37 PID 1624 wrote to memory of 2700 1624 svchost.exe 37 PID 1624 wrote to memory of 2700 1624 svchost.exe 37 PID 1624 wrote to memory of 1316 1624 svchost.exe 41 PID 1624 wrote to memory of 1316 1624 svchost.exe 41 PID 1624 wrote to memory of 1316 1624 svchost.exe 41 PID 1624 wrote to memory of 1316 1624 svchost.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\66f0d151d9994cc5811c746d48265e60N.exe"C:\Users\Admin\AppData\Local\Temp\66f0d151d9994cc5811c746d48265e60N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\users\admin\appdata\local\temp\66f0d151d9994cc5811c746d48265e60n.exec:\users\admin\appdata\local\temp\66f0d151d9994cc5811c746d48265e60n.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 08:24 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 08:25 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1316
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:2588
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5f135ee37bdc2bee6bf638994e6a94f0b
SHA14760b3c9a1bc86f8b57891cedd01ba76a6552e8c
SHA2565a1e6a26433d1c1d5b72ecf67ca89dba3ef9a35192b23640911bbf232c21b458
SHA51294346c7cf89c39440635ce876cba9b56571f7c40372a13717b565d202258586714932a3fcafdd6bbf64b91cc4a924b686de3ab9c2f53afcd6b77e801c1f1d785
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
135KB
MD5d80a198a9c74faf3b896f1e30eb77f24
SHA195a6302ede32415886dd299dac6800c5371ad49b
SHA256f18218f0a264ae75981c4fbbb81ed71f45a034f6433cf12966adf783715074ae
SHA5128abd60b13681651cbc3cd0336a4c25a6ce305fdebf30a6ea18daa422c347c27922af26ca3d036de0e2a913107b6b0aaede3cae369412ce9a4c8ccda928b34d82
-
Filesize
135KB
MD52e6baef9ae7870e20c45064147abc8a7
SHA194ab5ab24e5c57b103396b1a2e796906e02a995a
SHA2566fab554124b66e3771863dd771909cf08eb1d3a1dfb9dec97552ee15913a24cd
SHA512909e32bf2722522b3d1078fab3e87f74a66df732297b0ffd2bab7c5700f85147d96dda7f0c824da5c6121a2287b0122d5ed979712441f04385de34667e139b90
-
Filesize
3.1MB
MD5b6e5bd3c6abd734ac9d66f7dbcdb8409
SHA1485e46c4dcf4d1274eae63932c024bdf9fc52e34
SHA25628e424c515f3724c872fc1d5d79709fa9d13e7986c47fb678b90a677a225abf5
SHA5122e825c315db6761af99385d6be13308bc0f111d024b8a0e9e22d806d54b8312c1864f08799b73ee7b441719fb81d57000cfc5ce7ddc118745ca41226858db67b
-
Filesize
123KB
MD55236623449893c0e1e98fc95f067fcff
SHA150b4f1e2340b7c7ad065b2111fc075b2cafe6231
SHA256301f0d831d95bb5c3b5c57f8a92a35211531b410fcf2bd08927a286b867142a3
SHA5129b94bddcb5e64bbf3649567f16a828588423873b60858d45c40155f36cc7f95d205f4e9b6cdc8ac2852240fdb6a67d0940c60e4f103cecbf118eae1438019c0c
-
Filesize
135KB
MD565990c1cb89a28271cb77ee737f2ade0
SHA175ac156741165fe6e48e601b8a914c29c7b5aafe
SHA2569a4c3ad5e62aaa513b665aa2dfd7b232f1181aa23fd61a2100fb965fd1d7d9c4
SHA51290a3a57f7fef63ba0ea8c2939d44c825b3c76e4e6653db48c6708d6cd5ddc6c4acec9891d7ca4de1a91a718d88c7bf21e68752108b4b803b5e6894895d116379
-
Filesize
135KB
MD52c2472fe67884e4b9020a7ca95aa4f7a
SHA1a9882103262c95532b18c6e2152e9bbbaa068393
SHA25613b432711243dc3a4b8a6f4cb5e4fa14ae41298df61105267e4f6b4341515c3f
SHA512ca5a53c4f4bb3802ab268bc9c65c26a88717ae6c38704af0e565c569c15fbeef4f12ed3a8b5f5bc4ffc36156334a79d65730bcf948e6ae011df7e126080dd41b