Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe
Resource
win10v2004-20240709-en
General
-
Target
884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe
-
Size
135KB
-
MD5
92bb2504fc5b6032b5e1eb59dea9189f
-
SHA1
78e3850977f69aa2179dec884fc860ca695f196e
-
SHA256
884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11
-
SHA512
a2d9e5c380d7c26887e32b280bd25cc35477d851d10e1a2cf76306ce5e8b9daa4f8406d7389600d72038883c6f643ed94c61f718d9e80a2e147bbe1d5a12cde0
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVWEv:UVqoCl/YgjxEufVU0TbTyDDalEEv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4720 explorer.exe 856 spoolsv.exe 1808 svchost.exe 3112 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe 4720 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4720 explorer.exe 1808 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 4720 explorer.exe 4720 explorer.exe 856 spoolsv.exe 856 spoolsv.exe 1808 svchost.exe 1808 svchost.exe 3112 spoolsv.exe 3112 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4720 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 86 PID 4832 wrote to memory of 4720 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 86 PID 4832 wrote to memory of 4720 4832 884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe 86 PID 4720 wrote to memory of 856 4720 explorer.exe 87 PID 4720 wrote to memory of 856 4720 explorer.exe 87 PID 4720 wrote to memory of 856 4720 explorer.exe 87 PID 856 wrote to memory of 1808 856 spoolsv.exe 88 PID 856 wrote to memory of 1808 856 spoolsv.exe 88 PID 856 wrote to memory of 1808 856 spoolsv.exe 88 PID 1808 wrote to memory of 3112 1808 svchost.exe 89 PID 1808 wrote to memory of 3112 1808 svchost.exe 89 PID 1808 wrote to memory of 3112 1808 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe"C:\Users\Admin\AppData\Local\Temp\884efe24a754710222f86ef49b4a4834634d25988cb98bb63565fe7ebf422b11.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3112
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5177b55483fcc7c520b8495f306a4a68d
SHA1b8bc42dda2e0887114974c8083f1fd0032419839
SHA256568083562c3b0ba43d7af134b49a95f8c728c7b93041cc380e5082ef9ce4dddb
SHA51259eae21f266dd0f8df27c71e1ec8b978845ad7d2bf6330302cec2d4a026f268b3e264cbd482aa09a5ec87ffff4115728009af1371f7777d2c68afc17c8e51916
-
Filesize
135KB
MD5a11f8d9ac13c30a1b78489a78388bc69
SHA1e539b76402db198fae43eb973bd5769a9828d203
SHA2569753e4407803774d13bbc575bfcb2ddcbdb405456b97aee280bcf053164a7796
SHA512f3f7c8202159e0bf99392c0982374aa8ea1b06988fef388ac68e9eeb52cfab4cfda6ca4b0f357104f72ea6a6357ff6e086cdaec886888b2dc379b390f5a52f91
-
Filesize
135KB
MD582ec87f038399010dac3db557c188b44
SHA1236c3e2dc427384c2da01c02e159730b8ad05f50
SHA256b87159af94cd17631987e11f7a2eedaf68294db99cd0c5af96495afbc84a81f0
SHA51260923b1f14b01c1f6c967e1f950c632ef6e6da2c81c0ffce792141b747c53117f3f5b7a1f226f483d6eec344e38e577395d4ca218e500206f00bae1456f8ca70