Analysis

  • max time kernel
    120s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 17:18

General

  • Target

    476882ab641cf3f57e914868b7f5d500N.exe

  • Size

    207KB

  • MD5

    476882ab641cf3f57e914868b7f5d500

  • SHA1

    2ca2bbc515f0d23440d2ae0b445fbc95af7b90b5

  • SHA256

    e7239cf4c1ad58e01b43ad7b208b8e5023ddb84ca774cf2e7ad9fbb421cf6384

  • SHA512

    902a8ad2905574fe5e75f1a4666175eef635f912c6878aa02a8d5b0869b98fba0d4d07b8fe6b1c97d074371458e1186486f60d9ec2a0fa50f740bafa61f75145

  • SSDEEP

    1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdo:/VqoCl/YgjxEufVU0TbTyDDalbo

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\476882ab641cf3f57e914868b7f5d500N.exe
    "C:\Users\Admin\AppData\Local\Temp\476882ab641cf3f57e914868b7f5d500N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3044
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5100
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3968
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3992
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    206KB

    MD5

    3e66fd953b05cc0fe69c199251b6a766

    SHA1

    a349e1716d3c08207749fb409e3d89a45f40166e

    SHA256

    2b3b7d2e0d60c6cd05156f67e8ce87a51fdbe435f4f73dbb7aa0cb4084fc1207

    SHA512

    3157db4e3d0cd095f6ab232a37289212f9421ec7166007f27d0c14addb6ef4e33eb77323cea3795f7ba4dc681cf772c9044307f8b279410677a4fff07d75f905

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    207KB

    MD5

    9ddda843d965a7398e2f9a4bb7c69c06

    SHA1

    80b2f17e7b655a8d2f0548e517308734c88ddec2

    SHA256

    3826fdaf355f930cae9c118a5170ea5de7dbe1e85ca80da4296d1946776b141a

    SHA512

    e8e94e154e53b114d5f907776955ab3b608a18e11a772a0889fffa27346dc81f1e70e49fb5993a184f20a192a0a6bf73c5bb0eea204953814c8ea7664575f0ef

  • C:\Windows\Resources\svchost.exe

    Filesize

    206KB

    MD5

    462696a27c9631f9089048d19fd4657d

    SHA1

    2519abbfdb26d4f54f914eff2269cd59f70d6185

    SHA256

    de878479a48c05d1bae30e5f61d0e09eba6c6e1536d741cb2a690b8413467e06

    SHA512

    eb4df748929975cbc34a26e36330743b9b0a1ccc23bc9e43ab82cced313ffdf6bdd6bdcc9bfa20a76a4862d9e904d813961e8043714b567c2c41b730067f0d0c

  • memory/1412-32-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3044-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3044-34-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3968-33-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3992-36-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/5100-35-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB