Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe
Resource
win10v2004-20240802-en
General
-
Target
8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe
-
Size
11KB
-
MD5
26ce1cebefda7f0b266cce96d65266af
-
SHA1
111cec09050a02d6be9a8ac1287403079ea10978
-
SHA256
8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71
-
SHA512
c4b0249c29b8a9b37babae683c5118374119b51b1170507355fd27e9ff48f39dc724d71f5a56af8253ce1df1dfe2c95103847c9f7958c38d5a3e1b178e1c5fd9
-
SSDEEP
192:Zg6eHLE5KxkDpnqKjIdtaCRYvRtCk1rE1Ty68A3CuYYpZ7E:G6eHIAx0pqNgHvRtoyhASuYYpZ7E
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2652 xplorer.exe -
Loads dropped DLL 5 IoCs
pid Process 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\xplorer = "C:\\Windows\\xplorer\\xplorer.exe" reg.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xplorer.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xplorer\xplorer.exe 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe File opened for modification C:\Windows\xplorer\xplorer.exe 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xplorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe Token: SeDebugPrivilege 2652 xplorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 2652 xplorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2892 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 30 PID 2432 wrote to memory of 2892 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 30 PID 2432 wrote to memory of 2892 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 30 PID 2432 wrote to memory of 2892 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 30 PID 2892 wrote to memory of 2744 2892 cmd.exe 32 PID 2892 wrote to memory of 2744 2892 cmd.exe 32 PID 2892 wrote to memory of 2744 2892 cmd.exe 32 PID 2892 wrote to memory of 2744 2892 cmd.exe 32 PID 2432 wrote to memory of 2652 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 33 PID 2432 wrote to memory of 2652 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 33 PID 2432 wrote to memory of 2652 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 33 PID 2432 wrote to memory of 2652 2432 8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe"C:\Users\Admin\AppData\Local\Temp\8462556c700bc757868598e6ac13aaa7825ca162033d3a03bdad2c2a190f5a71.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ICHWX.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "xplorer" /t REG_SZ /d "C:\Windows\xplorer\xplorer.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
C:\Windows\xplorer\xplorer.exe"C:\Windows\xplorer\xplorer.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD54e6e99d38b1264af2b53a68c7cd6d648
SHA155ffe17732d1d9c539d702a1311ef9674fe7b3cf
SHA256168d9cdf4849fde3b4817db207e60934b6c877be439289f3fb3a4eb9e4326ff0
SHA512bde21abed1bfc3dbdd6afc83614aa27c3f33dfbb434e139523ac57ecd84875b0e96a241f5828eda0b055f787ec7f95850b0f4ab0ee752ac36484b2bfd78a859d
-
Filesize
11KB
MD513eb9e4f67b8a4b63a60f5531cdf9269
SHA1bbb849d69fff89e0e6948c0814b1541e74cb1fec
SHA2567b53583992794eaa7c226d532ab591960cee476762ddb34fcdc1c7ec825bf001
SHA512645e20a8ad345bb78bacd5e9817888e73453fa0c0fd882929412e298cad86adb0522d672e90c16533dd4026e496e8a0e5534e38480bd1530bc8ddea58798a34b