Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 05:58
Static task
static1
Behavioral task
behavioral1
Sample
3f221ec7bfaddef6408ec390f55f0a20N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f221ec7bfaddef6408ec390f55f0a20N.exe
Resource
win10v2004-20240802-en
General
-
Target
3f221ec7bfaddef6408ec390f55f0a20N.exe
-
Size
11KB
-
MD5
3f221ec7bfaddef6408ec390f55f0a20
-
SHA1
f8b94fb3a928f0b90f802d0bfc09f39e5ebe41c1
-
SHA256
0576d4515f0ae1262a0a5d03d0e3fa7d37ce1f15e0aee73bce878286f2d9ce43
-
SHA512
1769d076660e141b2cd46f12f98f3cf693415d2ca98ed431a12356214a34d63ca1be9020ec0cf1cb26514d2c4c6a78f1ef858ba0e5473f28ee137cf9b6aba2f3
-
SSDEEP
192:Zg6eHLE5KxkDpnqKjIdtaCRYvRtCk1rE1Ty68A3CuYYpZ7E:G6eHIAx0pqNgHvRtoyhASuYYpZ7E
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2656 xplorer.exe -
Loads dropped DLL 5 IoCs
pid Process 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\xplorer = "C:\\Windows\\xplorer\\xplorer.exe" reg.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xplorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3f221ec7bfaddef6408ec390f55f0a20N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xplorer\xplorer.exe 3f221ec7bfaddef6408ec390f55f0a20N.exe File opened for modification C:\Windows\xplorer\xplorer.exe 3f221ec7bfaddef6408ec390f55f0a20N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f221ec7bfaddef6408ec390f55f0a20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xplorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe Token: SeDebugPrivilege 2656 xplorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 2656 xplorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2696 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 30 PID 3024 wrote to memory of 2696 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 30 PID 3024 wrote to memory of 2696 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 30 PID 3024 wrote to memory of 2696 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 30 PID 2696 wrote to memory of 2884 2696 cmd.exe 32 PID 2696 wrote to memory of 2884 2696 cmd.exe 32 PID 2696 wrote to memory of 2884 2696 cmd.exe 32 PID 2696 wrote to memory of 2884 2696 cmd.exe 32 PID 3024 wrote to memory of 2656 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 33 PID 3024 wrote to memory of 2656 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 33 PID 3024 wrote to memory of 2656 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 33 PID 3024 wrote to memory of 2656 3024 3f221ec7bfaddef6408ec390f55f0a20N.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f221ec7bfaddef6408ec390f55f0a20N.exe"C:\Users\Admin\AppData\Local\Temp\3f221ec7bfaddef6408ec390f55f0a20N.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CWUSX.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "xplorer" /t REG_SZ /d "C:\Windows\xplorer\xplorer.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Windows\xplorer\xplorer.exe"C:\Windows\xplorer\xplorer.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD54e6e99d38b1264af2b53a68c7cd6d648
SHA155ffe17732d1d9c539d702a1311ef9674fe7b3cf
SHA256168d9cdf4849fde3b4817db207e60934b6c877be439289f3fb3a4eb9e4326ff0
SHA512bde21abed1bfc3dbdd6afc83614aa27c3f33dfbb434e139523ac57ecd84875b0e96a241f5828eda0b055f787ec7f95850b0f4ab0ee752ac36484b2bfd78a859d
-
Filesize
11KB
MD5e58b06893aaa15460fdf213188caca51
SHA17e5a3d2ce0ef4231f46626ff11e6b50872418346
SHA256d837c18c455b50316b2a08ef9f510427746bfd0daf66e767db1bfa6e94734837
SHA512884a84de91d1745e070674f4ac1d41e08acddf14cfde06331bb4dcc892a816f8517a9acb3685d3f97bca32c2e681a571cec4f5f235cc0156c0ad770c3878909c