Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 02:53

General

  • Target

    948564152f8f88071c3ee41f4bfce2a0N.exe

  • Size

    206KB

  • MD5

    948564152f8f88071c3ee41f4bfce2a0

  • SHA1

    ab731b2617b0f613192b6afb18ede8eb1ca40d7b

  • SHA256

    6a1056c7de935ac3c6a076cf4523ce72a37292d43675c447857a430b96a5e544

  • SHA512

    69d6864dae496cfaa10391d142d3ec084531288e0042551b2839fb4707e7d34f13ea36760a3d307eae6f8ce7936116732de03007e8678240996f5797a8dfbd49

  • SSDEEP

    3072:/VqoCl/YgjxEufVU0TbTyDDalbmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm3:/sLqdufVUNDao

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\948564152f8f88071c3ee41f4bfce2a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\948564152f8f88071c3ee41f4bfce2a0N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2668
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2756
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2808
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1528
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2532
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:55 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1000
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:56 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1724
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:3044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      206KB

      MD5

      4ed69870ff9a4ea6538321a4e9ca5a0b

      SHA1

      235dc43a0439e1f0751768c2a088d4bdd823343d

      SHA256

      1eba6c10818e069a54392be2bbf06f494b31b3ba3c3224d20511ce5a5250346a

      SHA512

      3d2782e0643ada0b8567264c736d46a9649b2a2e539ba109cd6b15350c4dd1d2493b76210b83be536ce1450c89bda032ebcf955713e0a7e545e9a32a49924290

    • \Windows\Resources\spoolsv.exe

      Filesize

      206KB

      MD5

      24f09023d39a632dcbd927d9462925a7

      SHA1

      97e5f55b1106549c8483d7ba3890fe96bd520a7c

      SHA256

      9b379d71aac6b0b0be77cadd03ee4515b048b6ac93383e6d1f8676352b2d9917

      SHA512

      e3251d63de185288c0662cecb8e1fb6fc7ba1700468b9c5be21cf01c9643e09eb1d5769f6cb76fc87a89880721ed27c34e3edda8231c9e158056808c0f7ee2ef

    • \Windows\Resources\svchost.exe

      Filesize

      206KB

      MD5

      5a63d33d001b638c8e19f1011fc2503c

      SHA1

      500ee67de77f2b91537fb15fa7a920b36630fe0f

      SHA256

      ee78b5e572cbb24981c37b62bc31dc78cd5a46fbc00e60cf0bd83e7107ff8499

      SHA512

      89adce6bd4263d33e7337aaa0eee43579b9517a629b1d8ccd8b2a7d25d3405b66506fbde0f000af27deff8157cfb925ed0352a444c8a52e48fef1403ce7d8a18

    • memory/1528-55-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2532-51-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2668-0-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2668-12-0x00000000002B0000-0x00000000002DF000-memory.dmp

      Filesize

      188KB

    • memory/2668-53-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2756-26-0x0000000000360000-0x000000000038F000-memory.dmp

      Filesize

      188KB

    • memory/2756-54-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2808-52-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB