Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
6be7110fc899c1da195cf897ba2ec060N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6be7110fc899c1da195cf897ba2ec060N.exe
Resource
win10v2004-20240802-en
General
-
Target
6be7110fc899c1da195cf897ba2ec060N.exe
-
Size
135KB
-
MD5
6be7110fc899c1da195cf897ba2ec060
-
SHA1
d471694dce574389703b31ec88d95a6810a24748
-
SHA256
4b88d014ff5456f0a977b13ad4bfdf1ad343c1e5764a000e10e6ee57b8558fca
-
SHA512
4f4519220cdf9e253c52031b4de4e02034bb1cd998e6a71d95210a3ba73042255483c099a510a3242a46bfda0f7ff78fca2b33818f88c076704a1158d163e470
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVHU:UVqoCl/YgjxEufVU0TbTyDDaldU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2660 explorer.exe 2916 spoolsv.exe 2668 svchost.exe 2580 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2660 explorer.exe 2916 spoolsv.exe 2668 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 6be7110fc899c1da195cf897ba2ec060N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6be7110fc899c1da195cf897ba2ec060N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1864 schtasks.exe 2584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2668 svchost.exe 2660 explorer.exe 2660 explorer.exe 2660 explorer.exe 2668 svchost.exe 2668 svchost.exe 2660 explorer.exe 2660 explorer.exe 2668 svchost.exe 2660 explorer.exe 2668 svchost.exe 2660 explorer.exe 2668 svchost.exe 2660 explorer.exe 2668 svchost.exe 2660 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2660 explorer.exe 2668 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2184 6be7110fc899c1da195cf897ba2ec060N.exe 2660 explorer.exe 2660 explorer.exe 2916 spoolsv.exe 2916 spoolsv.exe 2668 svchost.exe 2668 svchost.exe 2580 spoolsv.exe 2580 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2660 2184 6be7110fc899c1da195cf897ba2ec060N.exe 30 PID 2184 wrote to memory of 2660 2184 6be7110fc899c1da195cf897ba2ec060N.exe 30 PID 2184 wrote to memory of 2660 2184 6be7110fc899c1da195cf897ba2ec060N.exe 30 PID 2184 wrote to memory of 2660 2184 6be7110fc899c1da195cf897ba2ec060N.exe 30 PID 2660 wrote to memory of 2916 2660 explorer.exe 31 PID 2660 wrote to memory of 2916 2660 explorer.exe 31 PID 2660 wrote to memory of 2916 2660 explorer.exe 31 PID 2660 wrote to memory of 2916 2660 explorer.exe 31 PID 2916 wrote to memory of 2668 2916 spoolsv.exe 32 PID 2916 wrote to memory of 2668 2916 spoolsv.exe 32 PID 2916 wrote to memory of 2668 2916 spoolsv.exe 32 PID 2916 wrote to memory of 2668 2916 spoolsv.exe 32 PID 2668 wrote to memory of 2580 2668 svchost.exe 33 PID 2668 wrote to memory of 2580 2668 svchost.exe 33 PID 2668 wrote to memory of 2580 2668 svchost.exe 33 PID 2668 wrote to memory of 2580 2668 svchost.exe 33 PID 2660 wrote to memory of 2736 2660 explorer.exe 34 PID 2660 wrote to memory of 2736 2660 explorer.exe 34 PID 2660 wrote to memory of 2736 2660 explorer.exe 34 PID 2660 wrote to memory of 2736 2660 explorer.exe 34 PID 2668 wrote to memory of 2584 2668 svchost.exe 35 PID 2668 wrote to memory of 2584 2668 svchost.exe 35 PID 2668 wrote to memory of 2584 2668 svchost.exe 35 PID 2668 wrote to memory of 2584 2668 svchost.exe 35 PID 2668 wrote to memory of 1864 2668 svchost.exe 38 PID 2668 wrote to memory of 1864 2668 svchost.exe 38 PID 2668 wrote to memory of 1864 2668 svchost.exe 38 PID 2668 wrote to memory of 1864 2668 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6be7110fc899c1da195cf897ba2ec060N.exe"C:\Users\Admin\AppData\Local\Temp\6be7110fc899c1da195cf897ba2ec060N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 08:17 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2584
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 08:18 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1864
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD547148f55b418382e8f19040918555dbe
SHA1b7477792e567a9d13fd7f53a93788274757cdfd5
SHA256083d6a336b5c07d50d650e63be4ee31929b12bc97fea3cc553e071a2a690bd51
SHA512654d023a407094bca76bd91becb8e1b1c9e9c8ec7a0454e238d592473acfebfc83d9425222a9f4610e881b8afc7e9e53db0759a25294a2d1fb7ca4961c8b2c68
-
Filesize
135KB
MD5ee826f6b35d57617e7d50eb90cf4ea7e
SHA1fd36048dd251af2d50558faa76ed3670adcd0e70
SHA256cd33f772e6a6ea3dfb21f4100d61f93239ae2bf50ecf48cc050bb476e77f0ff3
SHA512932f7144454dc81e644bc33d55d8e846527038de2410b48e67fecf52ce9acb80795737480e0dd27ccac0c6bb097125aa9eedb3a7894d2cad43f4f04a948d4020
-
Filesize
135KB
MD5e252b89433ebdbab767091617242a1a3
SHA1fd626386024711f859d531eacf67475a1ddf4583
SHA2560f462d333c1c33bfa0f82a8531c6f34aa57496e5500b620f74ec43494e55da3d
SHA51293c6e57b7eb3c3ca95ff36af30c47b067b2a5da57c26997749ca3c74095c93fff6297ed46a17509d8ad3a15984891032fb75092c58e61ffdf8ba155a094f168c