Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
AppXor.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
AppXor.exe
Resource
win10v2004-20240802-en
General
-
Target
AppXor.exe
-
Size
790KB
-
MD5
48d161ecdea55f44e53df822e4947f5c
-
SHA1
2a38d2e290561a0937ccaff9c2eff59c554fbeaa
-
SHA256
07c6bdda512ecb8bbadcf57e4f98b3376ca121dd2102cc17513133d277b0430f
-
SHA512
c9d4c2755e82f5d8fa64c008fa5442ad3bde809b55011fc763b0c486eeb789a8b84f7f7226ec45fce4ef36adb5aad94513284ee620ead3822fca57df4aa70895
-
SSDEEP
12288:cFUNDaMzrJbjmrlbrJcYXrCbLrJdLOrOzrJ3bUrvJ:cFOayrxjmrFruYXrCvrHLOrgrtbUrvJ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 4716 appxor.exe 4544 icsys.icn.exe 1128 explorer.exe 5100 spoolsv.exe 2356 svchost.exe 2220 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe AppXor.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1624 4716 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppXor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language appxor.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4052 AppXor.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 4544 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1128 explorer.exe 2356 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4052 AppXor.exe 4052 AppXor.exe 4544 icsys.icn.exe 4544 icsys.icn.exe 1128 explorer.exe 1128 explorer.exe 5100 spoolsv.exe 5100 spoolsv.exe 2356 svchost.exe 2356 svchost.exe 2220 spoolsv.exe 2220 spoolsv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4716 4052 AppXor.exe 84 PID 4052 wrote to memory of 4716 4052 AppXor.exe 84 PID 4052 wrote to memory of 4716 4052 AppXor.exe 84 PID 4052 wrote to memory of 4544 4052 AppXor.exe 91 PID 4052 wrote to memory of 4544 4052 AppXor.exe 91 PID 4052 wrote to memory of 4544 4052 AppXor.exe 91 PID 4544 wrote to memory of 1128 4544 icsys.icn.exe 92 PID 4544 wrote to memory of 1128 4544 icsys.icn.exe 92 PID 4544 wrote to memory of 1128 4544 icsys.icn.exe 92 PID 1128 wrote to memory of 5100 1128 explorer.exe 93 PID 1128 wrote to memory of 5100 1128 explorer.exe 93 PID 1128 wrote to memory of 5100 1128 explorer.exe 93 PID 5100 wrote to memory of 2356 5100 spoolsv.exe 94 PID 5100 wrote to memory of 2356 5100 spoolsv.exe 94 PID 5100 wrote to memory of 2356 5100 spoolsv.exe 94 PID 2356 wrote to memory of 2220 2356 svchost.exe 95 PID 2356 wrote to memory of 2220 2356 svchost.exe 95 PID 2356 wrote to memory of 2220 2356 svchost.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\AppXor.exe"C:\Users\Admin\AppData\Local\Temp\AppXor.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
\??\c:\users\admin\appdata\local\temp\appxor.exec:\users\admin\appdata\local\temp\appxor.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 10803⤵
- Program crash
PID:1624
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4544 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2220
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4716 -ip 47161⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
655KB
MD54bfe50ad13d9656904e0a457ecb9ad67
SHA16bb235ef4824108bd2818e894be507a7ee1ca979
SHA2565f04ad825ab9c801743d44cca48c8eb4d367090ff328d9d7dac93a3f67383f15
SHA5123543dc41ba5b03233462f2c1598ace6f1f4eae437c504a365e569dab899e6a3cc62503cfa84cecb54060122e80b40b8b1b6e098243079fbcfc4a6e8e840c5052
-
Filesize
135KB
MD56adc0874f762fc9d0d29eac99b2fc32d
SHA1b3e7d10c369befd6f7c7fbd4ea5a878d3244a2f7
SHA2560cf5f293ff1f160816de0c0b980a662a1461cbca644c87d9abdde0b38020a0aa
SHA512ec83acb52ccb9673140564b07b8ecd8787d51a776813706652ac7b733ffb36002b08c5ccd1b6d920ad0f98e69cf9f7ad9f693c17198063682d207277a5c6581c
-
Filesize
135KB
MD5c8ad376971a8ca97eeb6d9a54284cc38
SHA142d87738158b0c08f21bc13e99ebe989836412e5
SHA256ac385c73cbad57313bdc9cc3ab69625869845a8ab5b7a8f5bfb98dc9bdae592a
SHA5126dfd4c2cf3f9dd59465286f7baba2e1c0e109319821dd889609587a53409276d55346c7fa7e2a6620fb4052e611ef0a57c6f7fb5d5f4a4d87ad7817ef65ba8c5
-
Filesize
135KB
MD52c56b97d86df21c20a3edf17e03d07b9
SHA1ece0cec898b86a2189a16ef35d4e8ff21d3c4881
SHA2563760e325e2fc6488f6ac05832c2255541ce974e2c78347bcd2164c41ff4fd3f1
SHA51209d9079e473e35d6ae6c89d27a30e6f6194562ccd70754738e3bd7b1e304bf1c6fa28ac94297f223c904731b439d5e65c705b42bc154cb3b91c9f21bf6fc6f95
-
Filesize
135KB
MD5b6813cc92e031a60f8484cc950320f45
SHA17f774cebead4f4d26d9c6267d60ca988ea9aafe9
SHA2561c5f2b078454d7ffd2737db972fba5a7811a850476b70fe8e5854da88504b50e
SHA512e60b717530b919ad92bf276adb7a4da6b6948d9de3963ce384f5d56a26daa011c3937be36cb78b7d663e9afc4afa28bacb6b3b9ffa87e3b6b13c831e68c657f9