Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 14:33
Behavioral task
behavioral1
Sample
93169837722e0c193629eaf6641bbed0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
93169837722e0c193629eaf6641bbed0N.exe
Resource
win10v2004-20240802-en
General
-
Target
93169837722e0c193629eaf6641bbed0N.exe
-
Size
43KB
-
MD5
93169837722e0c193629eaf6641bbed0
-
SHA1
824f5615d21f977817a1c9ee71194c9858bf215e
-
SHA256
5aca2d346f99ae5e51d1a1c6055216c543ec739a837d0344c1f5395a0c6ca2be
-
SHA512
4bffa5fb2a9ac719a8c6c122024fe1c1265970c93c95b9b9ad9a5532202e3ef42be1e69b79c9834d66ff6d9fb235d9aed368df2cf452e78b1ece9611868e2252
-
SSDEEP
768:pB3Yvnl5pzqsgKnXpkoHS6KZIFhf8HuKWJI3HG+VVVYMvsI:zIvl5dKYXGB2IuPJI3kI
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2700 explorer.exe 2816 spoolsv.exe 2616 svchost.exe 2856 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 2700 explorer.exe 2700 explorer.exe 2816 spoolsv.exe 2816 spoolsv.exe 2616 svchost.exe 2616 svchost.exe -
resource yara_rule behavioral1/memory/1476-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/files/0x0009000000018b2b-6.dat upx behavioral1/files/0x0008000000018bec-21.dat upx behavioral1/files/0x0007000000019221-33.dat upx behavioral1/memory/2616-40-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1476-47-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2856-54-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2816-56-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/1476-58-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2700-59-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2616-60-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2700-71-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 93169837722e0c193629eaf6641bbed0N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93169837722e0c193629eaf6641bbed0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3028 schtasks.exe 948 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2700 explorer.exe 2700 explorer.exe 2700 explorer.exe 2616 svchost.exe 2616 svchost.exe 2700 explorer.exe 2700 explorer.exe 2616 svchost.exe 2700 explorer.exe 2616 svchost.exe 2700 explorer.exe 2616 svchost.exe 2700 explorer.exe 2616 svchost.exe 2700 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2700 explorer.exe 2616 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1476 93169837722e0c193629eaf6641bbed0N.exe 1476 93169837722e0c193629eaf6641bbed0N.exe 2700 explorer.exe 2700 explorer.exe 2816 spoolsv.exe 2816 spoolsv.exe 2616 svchost.exe 2616 svchost.exe 2856 spoolsv.exe 2856 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2700 1476 93169837722e0c193629eaf6641bbed0N.exe 30 PID 1476 wrote to memory of 2700 1476 93169837722e0c193629eaf6641bbed0N.exe 30 PID 1476 wrote to memory of 2700 1476 93169837722e0c193629eaf6641bbed0N.exe 30 PID 1476 wrote to memory of 2700 1476 93169837722e0c193629eaf6641bbed0N.exe 30 PID 2700 wrote to memory of 2816 2700 explorer.exe 31 PID 2700 wrote to memory of 2816 2700 explorer.exe 31 PID 2700 wrote to memory of 2816 2700 explorer.exe 31 PID 2700 wrote to memory of 2816 2700 explorer.exe 31 PID 2816 wrote to memory of 2616 2816 spoolsv.exe 32 PID 2816 wrote to memory of 2616 2816 spoolsv.exe 32 PID 2816 wrote to memory of 2616 2816 spoolsv.exe 32 PID 2816 wrote to memory of 2616 2816 spoolsv.exe 32 PID 2616 wrote to memory of 2856 2616 svchost.exe 33 PID 2616 wrote to memory of 2856 2616 svchost.exe 33 PID 2616 wrote to memory of 2856 2616 svchost.exe 33 PID 2616 wrote to memory of 2856 2616 svchost.exe 33 PID 2700 wrote to memory of 1796 2700 explorer.exe 34 PID 2700 wrote to memory of 1796 2700 explorer.exe 34 PID 2700 wrote to memory of 1796 2700 explorer.exe 34 PID 2700 wrote to memory of 1796 2700 explorer.exe 34 PID 2616 wrote to memory of 3028 2616 svchost.exe 35 PID 2616 wrote to memory of 3028 2616 svchost.exe 35 PID 2616 wrote to memory of 3028 2616 svchost.exe 35 PID 2616 wrote to memory of 3028 2616 svchost.exe 35 PID 2616 wrote to memory of 948 2616 svchost.exe 38 PID 2616 wrote to memory of 948 2616 svchost.exe 38 PID 2616 wrote to memory of 948 2616 svchost.exe 38 PID 2616 wrote to memory of 948 2616 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\93169837722e0c193629eaf6641bbed0N.exe"C:\Users\Admin\AppData\Local\Temp\93169837722e0c193629eaf6641bbed0N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 14:35 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 14:36 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:948
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:1796
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD59f7bca50bd34eb07c92cd774561d2ac4
SHA1bc9319636516fc340469c69ca303ddea5e69e5e8
SHA256488623aa57599a4526ba0bcaa477678ea9d4e81486104fa437e5ee8454aa47f0
SHA512ffdec87a4be3ee9b0d5ffbea3ee2ff5710d9e68e76690dc4de2734cd3c3d976f424632ae344f521cf8b721bd3ab5734ce0fc869dc5426c9e11fcb818651dd0b7
-
Filesize
43KB
MD5e0c3ddf22f4c5a1d8ed2b047c06df44e
SHA1cd10fa4c2c440fb3fefa0df3752c1d7c887340f6
SHA256330f75958f87096c690f50ff54880dbc5e5e2299aafb83ad5e1980ad8163ab85
SHA51203a217f91466fb575b8d60713ff04cbdc65eb8fb5ef8fd7f0865290827af231891871fda62533ca33100793f93139cff97f20971cf0be4133173685c13537521
-
Filesize
43KB
MD557be43a64c6098f5018706c88328d7a7
SHA16e77a9f2fa00d5e4101e9a248edbdf47878834f8
SHA2563d2ed97b851f4c788479db9a22ca84a1c48d0df5645d0390bfe4eeddc43cc90c
SHA512d01621fafa3d4b69b8438c2b43453333c5db48e0585d1406b89d1d52eab133bafa1ca677df7cff029fe41cf506b2c8506c66ed1bc7e21df9e8345d3459eb0a8d