Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe
Resource
win10v2004-20240802-en
General
-
Target
60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe
-
Size
135KB
-
MD5
97ac4fe44c97eeb3dfcb6482687bc505
-
SHA1
d9ab671be87c6c8aed66e82051733a8202bb86e6
-
SHA256
60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7
-
SHA512
7014813192dd22f801b68f754ce0ee5166312b90375acdd32b20ffca727d3a39185473367f8dbc26153f500844f87623a9373b6a9b8b314f322ca02c820de2a5
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVI3:UVqoCl/YgjxEufVU0TbTyDDal+3
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2584 explorer.exe 3916 spoolsv.exe 2464 svchost.exe 4744 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe 2584 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2584 explorer.exe 2464 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 2584 explorer.exe 2584 explorer.exe 3916 spoolsv.exe 3916 spoolsv.exe 2464 svchost.exe 2464 svchost.exe 4744 spoolsv.exe 4744 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2584 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 84 PID 1096 wrote to memory of 2584 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 84 PID 1096 wrote to memory of 2584 1096 60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe 84 PID 2584 wrote to memory of 3916 2584 explorer.exe 85 PID 2584 wrote to memory of 3916 2584 explorer.exe 85 PID 2584 wrote to memory of 3916 2584 explorer.exe 85 PID 3916 wrote to memory of 2464 3916 spoolsv.exe 86 PID 3916 wrote to memory of 2464 3916 spoolsv.exe 86 PID 3916 wrote to memory of 2464 3916 spoolsv.exe 86 PID 2464 wrote to memory of 4744 2464 svchost.exe 87 PID 2464 wrote to memory of 4744 2464 svchost.exe 87 PID 2464 wrote to memory of 4744 2464 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe"C:\Users\Admin\AppData\Local\Temp\60413b10c81848e2d83c36128197c3620b7b5b6cfa4e03ea3e0ffc88a47574f7.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3916 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4744
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD54ba37b81b481a0e0e1b486f5cd094d52
SHA11c2fd2907d5811839f14df9fa0e381086fbfecdb
SHA2568471abce32a89f2c4a5cbccdc7fcc12dd0b084bd3649d5b97ef2bdd1076d96a1
SHA51223d9680a8e46d383e8b871e976a799a097a3a3a98ab874504781a53aebc49c0bc728eb67d0014e15ceb352ede019490d342df8ae70c3ae3dbb0ae64b896750e2
-
Filesize
135KB
MD59f83a8921f3dfe27a3a96b60af83609f
SHA1ed2c8a282cf39122fb304e30c4640047274f9cc9
SHA256400991aaf5d11440407ce9d44dcf7f7fb2be11f46b71e93243a4642f74c6f3e2
SHA512a716514b79b3740671634439835a58283222487015bac9c030e8fa9072c72f701ba6f4dc82385be2301a287d35e087009551cf917d38ced5936025c391c96907
-
Filesize
135KB
MD5bcfd5e2d1117d17a7e14247b2534c5fc
SHA1b1aae427977f29c88cd2f98d17ec79495d780dc8
SHA25612659869193f8575aa3a1b889f44d2846deeb0184b87956c481cc9670e5cf796
SHA512cf607c6d682d40b2ed7a34dea59961b54d9f41895e2b734850dd42377709940ef67549fb6fbbc2fd4763f0a4ca3a66c450b2ae64cae4aa384893112887b80fef