Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
948564152f8f88071c3ee41f4bfce2a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
948564152f8f88071c3ee41f4bfce2a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
948564152f8f88071c3ee41f4bfce2a0N.exe
-
Size
206KB
-
MD5
948564152f8f88071c3ee41f4bfce2a0
-
SHA1
ab731b2617b0f613192b6afb18ede8eb1ca40d7b
-
SHA256
6a1056c7de935ac3c6a076cf4523ce72a37292d43675c447857a430b96a5e544
-
SHA512
69d6864dae496cfaa10391d142d3ec084531288e0042551b2839fb4707e7d34f13ea36760a3d307eae6f8ce7936116732de03007e8678240996f5797a8dfbd49
-
SSDEEP
3072:/VqoCl/YgjxEufVU0TbTyDDalbmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm3:/sLqdufVUNDao
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2756 explorer.exe 2808 spoolsv.exe 1528 svchost.exe 2532 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2756 explorer.exe 2756 explorer.exe 2808 spoolsv.exe 2808 spoolsv.exe 1528 svchost.exe 1528 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 948564152f8f88071c3ee41f4bfce2a0N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 948564152f8f88071c3ee41f4bfce2a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1000 schtasks.exe 1724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 1528 svchost.exe 1528 svchost.exe 2756 explorer.exe 1528 svchost.exe 2756 explorer.exe 1528 svchost.exe 2756 explorer.exe 1528 svchost.exe 2756 explorer.exe 1528 svchost.exe 2756 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2756 explorer.exe 1528 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 2756 explorer.exe 2756 explorer.exe 2808 spoolsv.exe 2808 spoolsv.exe 1528 svchost.exe 1528 svchost.exe 2532 spoolsv.exe 2532 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2756 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 30 PID 2668 wrote to memory of 2756 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 30 PID 2668 wrote to memory of 2756 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 30 PID 2668 wrote to memory of 2756 2668 948564152f8f88071c3ee41f4bfce2a0N.exe 30 PID 2756 wrote to memory of 2808 2756 explorer.exe 31 PID 2756 wrote to memory of 2808 2756 explorer.exe 31 PID 2756 wrote to memory of 2808 2756 explorer.exe 31 PID 2756 wrote to memory of 2808 2756 explorer.exe 31 PID 2808 wrote to memory of 1528 2808 spoolsv.exe 32 PID 2808 wrote to memory of 1528 2808 spoolsv.exe 32 PID 2808 wrote to memory of 1528 2808 spoolsv.exe 32 PID 2808 wrote to memory of 1528 2808 spoolsv.exe 32 PID 1528 wrote to memory of 2532 1528 svchost.exe 33 PID 1528 wrote to memory of 2532 1528 svchost.exe 33 PID 1528 wrote to memory of 2532 1528 svchost.exe 33 PID 1528 wrote to memory of 2532 1528 svchost.exe 33 PID 2756 wrote to memory of 3044 2756 explorer.exe 34 PID 2756 wrote to memory of 3044 2756 explorer.exe 34 PID 2756 wrote to memory of 3044 2756 explorer.exe 34 PID 2756 wrote to memory of 3044 2756 explorer.exe 34 PID 1528 wrote to memory of 1000 1528 svchost.exe 35 PID 1528 wrote to memory of 1000 1528 svchost.exe 35 PID 1528 wrote to memory of 1000 1528 svchost.exe 35 PID 1528 wrote to memory of 1000 1528 svchost.exe 35 PID 1528 wrote to memory of 1724 1528 svchost.exe 38 PID 1528 wrote to memory of 1724 1528 svchost.exe 38 PID 1528 wrote to memory of 1724 1528 svchost.exe 38 PID 1528 wrote to memory of 1724 1528 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\948564152f8f88071c3ee41f4bfce2a0N.exe"C:\Users\Admin\AppData\Local\Temp\948564152f8f88071c3ee41f4bfce2a0N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:55 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:56 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1724
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:3044
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD54ed69870ff9a4ea6538321a4e9ca5a0b
SHA1235dc43a0439e1f0751768c2a088d4bdd823343d
SHA2561eba6c10818e069a54392be2bbf06f494b31b3ba3c3224d20511ce5a5250346a
SHA5123d2782e0643ada0b8567264c736d46a9649b2a2e539ba109cd6b15350c4dd1d2493b76210b83be536ce1450c89bda032ebcf955713e0a7e545e9a32a49924290
-
Filesize
206KB
MD524f09023d39a632dcbd927d9462925a7
SHA197e5f55b1106549c8483d7ba3890fe96bd520a7c
SHA2569b379d71aac6b0b0be77cadd03ee4515b048b6ac93383e6d1f8676352b2d9917
SHA512e3251d63de185288c0662cecb8e1fb6fc7ba1700468b9c5be21cf01c9643e09eb1d5769f6cb76fc87a89880721ed27c34e3edda8231c9e158056808c0f7ee2ef
-
Filesize
206KB
MD55a63d33d001b638c8e19f1011fc2503c
SHA1500ee67de77f2b91537fb15fa7a920b36630fe0f
SHA256ee78b5e572cbb24981c37b62bc31dc78cd5a46fbc00e60cf0bd83e7107ff8499
SHA51289adce6bd4263d33e7337aaa0eee43579b9517a629b1d8ccd8b2a7d25d3405b66506fbde0f000af27deff8157cfb925ed0352a444c8a52e48fef1403ce7d8a18