Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 21:35
Static task
static1
Behavioral task
behavioral1
Sample
6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe
Resource
win10v2004-20240802-en
General
-
Target
6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe
-
Size
135KB
-
MD5
33b4368c4c760e6d19d9beb40cc6fb23
-
SHA1
1c4b48a85360d7743f201fddbc51a28cb8b9aee7
-
SHA256
6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac
-
SHA512
d9fc683ebd4f363f6747aba5035352edab54bedca89490a206ba9f93fb63bd4659b320312bd86bd8956a0e97db2faf990e4098e44094e1bab504dbeb36ff6ae4
-
SSDEEP
1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbgGb:XVqoCl/YgjxEufVU0TbTyDDal5b
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3328 explorer.exe 4884 spoolsv.exe 3264 svchost.exe 1844 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe 3328 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3328 explorer.exe 3264 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 3328 explorer.exe 3328 explorer.exe 4884 spoolsv.exe 4884 spoolsv.exe 3264 svchost.exe 3264 svchost.exe 1844 spoolsv.exe 1844 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2956 wrote to memory of 3328 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 84 PID 2956 wrote to memory of 3328 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 84 PID 2956 wrote to memory of 3328 2956 6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe 84 PID 3328 wrote to memory of 4884 3328 explorer.exe 85 PID 3328 wrote to memory of 4884 3328 explorer.exe 85 PID 3328 wrote to memory of 4884 3328 explorer.exe 85 PID 4884 wrote to memory of 3264 4884 spoolsv.exe 87 PID 4884 wrote to memory of 3264 4884 spoolsv.exe 87 PID 4884 wrote to memory of 3264 4884 spoolsv.exe 87 PID 3264 wrote to memory of 1844 3264 svchost.exe 88 PID 3264 wrote to memory of 1844 3264 svchost.exe 88 PID 3264 wrote to memory of 1844 3264 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe"C:\Users\Admin\AppData\Local\Temp\6766f16a055a3312623083583c7afa08d0d861bd030ad85b3e22f50e188882ac.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3328 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4884 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3264 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5cc09eed5de3038220c44df940bfddf2b
SHA19a6820074ce30d15e4b4a8f05f45193441b279a3
SHA25626299700d84be5780e43be4fadc99cacdcb6b127bc792105b39b7d5a022285c1
SHA5129dbba231622855a311485e0a93ce19d3120b281dd692c5333c269565c134fe2c32aa5c43d8532d95b5b5b4c939a5f718ac34c90360fb1280ccf872dc94cfb6e7
-
Filesize
135KB
MD5fd790f53eabd205f3efd31e16ccbafa0
SHA1214f3e81aa9234669a4421b561d300001f891c63
SHA256ba32224678216167a2daeb8d593d92712ec7685dbfe659a58a8dfdacdac5e7c9
SHA51265244bdd7c86afc9dbd8e392fab4aa7d8bd59f624f36a1e1cee6b07c03908a160640a55f53b036325e5a571e3b37e45a189c4d48fedebed37b271610d5e9fb82
-
Filesize
135KB
MD51719a02a2f5b2c8c0b85ab2d9f3c7477
SHA1b40bf0f8379d9fdc9f79f8ded9937b1f0ecb6e91
SHA2566367af9a069ebe7e3630512259c70ff636d0569f290d2cf2d1ceff3ee761743a
SHA512648719807700995b51d74a3510dcd292caf17bf14e721ccc83f338e6ecae078d3ade80dec2e41f9a1c5abc7f4b4fc34e6975a973475efac4068cd26495f90a24