Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 07:51

General

  • Target

    AppXor.exe

  • Size

    790KB

  • MD5

    48d161ecdea55f44e53df822e4947f5c

  • SHA1

    2a38d2e290561a0937ccaff9c2eff59c554fbeaa

  • SHA256

    07c6bdda512ecb8bbadcf57e4f98b3376ca121dd2102cc17513133d277b0430f

  • SHA512

    c9d4c2755e82f5d8fa64c008fa5442ad3bde809b55011fc763b0c486eeb789a8b84f7f7226ec45fce4ef36adb5aad94513284ee620ead3822fca57df4aa70895

  • SSDEEP

    12288:cFUNDaMzrJbjmrlbrJcYXrCbLrJdLOrOzrJ3bUrvJ:cFOayrxjmrFruYXrCvrHLOrgrtbUrvJ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AppXor.exe
    "C:\Users\Admin\AppData\Local\Temp\AppXor.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4052
    • \??\c:\users\admin\appdata\local\temp\appxor.exe 
      c:\users\admin\appdata\local\temp\appxor.exe 
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 1080
        3⤵
        • Program crash
        PID:1624
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4544
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1128
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5100
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2356
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2220
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4716 -ip 4716
    1⤵
      PID:4696

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\appxor.exe 

            Filesize

            655KB

            MD5

            4bfe50ad13d9656904e0a457ecb9ad67

            SHA1

            6bb235ef4824108bd2818e894be507a7ee1ca979

            SHA256

            5f04ad825ab9c801743d44cca48c8eb4d367090ff328d9d7dac93a3f67383f15

            SHA512

            3543dc41ba5b03233462f2c1598ace6f1f4eae437c504a365e569dab899e6a3cc62503cfa84cecb54060122e80b40b8b1b6e098243079fbcfc4a6e8e840c5052

          • C:\Windows\Resources\Themes\explorer.exe

            Filesize

            135KB

            MD5

            6adc0874f762fc9d0d29eac99b2fc32d

            SHA1

            b3e7d10c369befd6f7c7fbd4ea5a878d3244a2f7

            SHA256

            0cf5f293ff1f160816de0c0b980a662a1461cbca644c87d9abdde0b38020a0aa

            SHA512

            ec83acb52ccb9673140564b07b8ecd8787d51a776813706652ac7b733ffb36002b08c5ccd1b6d920ad0f98e69cf9f7ad9f693c17198063682d207277a5c6581c

          • C:\Windows\Resources\Themes\icsys.icn.exe

            Filesize

            135KB

            MD5

            c8ad376971a8ca97eeb6d9a54284cc38

            SHA1

            42d87738158b0c08f21bc13e99ebe989836412e5

            SHA256

            ac385c73cbad57313bdc9cc3ab69625869845a8ab5b7a8f5bfb98dc9bdae592a

            SHA512

            6dfd4c2cf3f9dd59465286f7baba2e1c0e109319821dd889609587a53409276d55346c7fa7e2a6620fb4052e611ef0a57c6f7fb5d5f4a4d87ad7817ef65ba8c5

          • C:\Windows\Resources\spoolsv.exe

            Filesize

            135KB

            MD5

            2c56b97d86df21c20a3edf17e03d07b9

            SHA1

            ece0cec898b86a2189a16ef35d4e8ff21d3c4881

            SHA256

            3760e325e2fc6488f6ac05832c2255541ce974e2c78347bcd2164c41ff4fd3f1

            SHA512

            09d9079e473e35d6ae6c89d27a30e6f6194562ccd70754738e3bd7b1e304bf1c6fa28ac94297f223c904731b439d5e65c705b42bc154cb3b91c9f21bf6fc6f95

          • C:\Windows\Resources\svchost.exe

            Filesize

            135KB

            MD5

            b6813cc92e031a60f8484cc950320f45

            SHA1

            7f774cebead4f4d26d9c6267d60ca988ea9aafe9

            SHA256

            1c5f2b078454d7ffd2737db972fba5a7811a850476b70fe8e5854da88504b50e

            SHA512

            e60b717530b919ad92bf276adb7a4da6b6948d9de3963ce384f5d56a26daa011c3937be36cb78b7d663e9afc4afa28bacb6b3b9ffa87e3b6b13c831e68c657f9

          • memory/1128-57-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/2220-53-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/2356-58-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4052-0-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4052-56-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4544-55-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4544-20-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/4716-16-0x0000000074E70000-0x0000000075620000-memory.dmp

            Filesize

            7.7MB

          • memory/4716-10-0x0000000000480000-0x0000000000528000-memory.dmp

            Filesize

            672KB

          • memory/4716-9-0x0000000074E7E000-0x0000000074E7F000-memory.dmp

            Filesize

            4KB

          • memory/4716-24-0x0000000074E70000-0x0000000075620000-memory.dmp

            Filesize

            7.7MB

          • memory/4716-11-0x0000000004EE0000-0x0000000004F7C000-memory.dmp

            Filesize

            624KB

          • memory/4716-12-0x0000000005590000-0x0000000005B34000-memory.dmp

            Filesize

            5.6MB

          • memory/4716-15-0x0000000005120000-0x0000000005176000-memory.dmp

            Filesize

            344KB

          • memory/4716-14-0x0000000004FB0000-0x0000000004FBA000-memory.dmp

            Filesize

            40KB

          • memory/4716-13-0x0000000005080000-0x0000000005112000-memory.dmp

            Filesize

            584KB

          • memory/5100-54-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB