Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 23:22

General

  • Target

    62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe

  • Size

    3.6MB

  • MD5

    7dbbec6df3ed420c7ade36b50d9fd3d8

  • SHA1

    e7c08bf3a79343dfb7fda05414535c6a8ef20c42

  • SHA256

    62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099

  • SHA512

    56dcf4f10414c6d57a1bca6ea484b3355e8f77f06d9090a32649c3a1ec00768c79469f326662afb1f842d70f2cd4fb1e066cc5eabf0febc45a2bcac0afbc9810

  • SSDEEP

    98304:ddByXcdnlLwOrI5Vfeg91hZOhkRpsinjx:ddien+OrFuBR6cx

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe
    "C:\Users\Admin\AppData\Local\Temp\62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2632
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2688
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2900
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2728
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2596
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:24 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2084
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:25 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1644
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:26 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2004
      • C:\Windows\Explorer.exe
        C:\Windows\Explorer.exe
        3⤵
          PID:2868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      3.6MB

      MD5

      15812d925016fe50c362f395824c87df

      SHA1

      a4517e9d891c2138c37f578910276edd07ce39b1

      SHA256

      9192d9d5a195333aaa199ef95da034a3f76f65380b96315c7825c3e01f58cb84

      SHA512

      a0df2d311b16e98c3d355fcea6b441dd9e920f8b6518824af601629c19845a4bb37ee9ea60c49f002e2e2bbbbbfd54637c4f3c66958dec5aee342476868f509f

    • \Windows\Resources\Themes\explorer.exe

      Filesize

      3.6MB

      MD5

      d52c3b73d1358a5962f347042d9929af

      SHA1

      9fa07ec3f828dbb92915a4c856561cfe63bb704d

      SHA256

      6f01e4ece9bde878bdde0159389d3d7c8fd8f785268c96aeec2fc42b9e5c7030

      SHA512

      bb08ed35d41a74e82fc7ab366ead737ccc8f2400721a1c7101d5e5e1924e51298c7aae583eb22e0985fd40456681af7d301de45861e45f60444024b1914882b4

    • \Windows\Resources\svchost.exe

      Filesize

      3.6MB

      MD5

      ac2597054725021b83a87c5407df4e67

      SHA1

      f41024700f38a92920ac899e889e9ebf93289079

      SHA256

      a7b6e845f223b523ccb7b4c4e4b53228c2a801b9a8f1fbb9ec3b8d09ab2a70bc

      SHA512

      675a39490204f9d2d4162e538c55d52cbcd99372870cf1d9367afb2c7a63bfa9449fb2101d6ad76640002ed39aee1487cb8932e02e6cef5219d2d5104b514658

    • memory/2596-44-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2596-49-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2632-3-0x0000000077B50000-0x0000000077B51000-memory.dmp

      Filesize

      4KB

    • memory/2632-0-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2632-10-0x00000000039D0000-0x0000000003D54000-memory.dmp

      Filesize

      3.5MB

    • memory/2632-53-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2632-37-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-71-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-73-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-83-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-81-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-79-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-22-0x0000000003890000-0x0000000003C14000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-54-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-77-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-56-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-75-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-12-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-59-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-69-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-67-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-61-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-63-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2688-65-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-55-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-57-0x00000000039A0000-0x0000000003D24000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-62-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-74-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-60-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-70-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-58-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-72-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-66-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-84-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-68-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-76-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-64-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-78-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-43-0x00000000039A0000-0x0000000003D24000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-36-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2728-82-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2900-51-0x0000000000400000-0x0000000000784000-memory.dmp

      Filesize

      3.5MB

    • memory/2900-34-0x0000000003870000-0x0000000003BF4000-memory.dmp

      Filesize

      3.5MB