Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe
Resource
win10v2004-20240802-en
General
-
Target
62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe
-
Size
3.6MB
-
MD5
7dbbec6df3ed420c7ade36b50d9fd3d8
-
SHA1
e7c08bf3a79343dfb7fda05414535c6a8ef20c42
-
SHA256
62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099
-
SHA512
56dcf4f10414c6d57a1bca6ea484b3355e8f77f06d9090a32649c3a1ec00768c79469f326662afb1f842d70f2cd4fb1e066cc5eabf0febc45a2bcac0afbc9810
-
SSDEEP
98304:ddByXcdnlLwOrI5Vfeg91hZOhkRpsinjx:ddien+OrFuBR6cx
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2688 explorer.exe 2900 spoolsv.exe 2728 svchost.exe 2596 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2688 explorer.exe 2900 spoolsv.exe 2728 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
pid Process 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2688 explorer.exe 2900 spoolsv.exe 2728 svchost.exe 2728 svchost.exe 2596 spoolsv.exe 2596 spoolsv.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2084 schtasks.exe 1644 schtasks.exe 2004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2688 explorer.exe 2688 explorer.exe 2728 svchost.exe 2728 svchost.exe 2688 explorer.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe 2688 explorer.exe 2728 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2688 explorer.exe 2728 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2688 explorer.exe 2688 explorer.exe 2688 explorer.exe 2900 spoolsv.exe 2900 spoolsv.exe 2900 spoolsv.exe 2728 svchost.exe 2728 svchost.exe 2728 svchost.exe 2596 spoolsv.exe 2596 spoolsv.exe 2596 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2688 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 31 PID 2632 wrote to memory of 2688 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 31 PID 2632 wrote to memory of 2688 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 31 PID 2632 wrote to memory of 2688 2632 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 31 PID 2688 wrote to memory of 2900 2688 explorer.exe 32 PID 2688 wrote to memory of 2900 2688 explorer.exe 32 PID 2688 wrote to memory of 2900 2688 explorer.exe 32 PID 2688 wrote to memory of 2900 2688 explorer.exe 32 PID 2900 wrote to memory of 2728 2900 spoolsv.exe 33 PID 2900 wrote to memory of 2728 2900 spoolsv.exe 33 PID 2900 wrote to memory of 2728 2900 spoolsv.exe 33 PID 2900 wrote to memory of 2728 2900 spoolsv.exe 33 PID 2728 wrote to memory of 2596 2728 svchost.exe 34 PID 2728 wrote to memory of 2596 2728 svchost.exe 34 PID 2728 wrote to memory of 2596 2728 svchost.exe 34 PID 2728 wrote to memory of 2596 2728 svchost.exe 34 PID 2688 wrote to memory of 2868 2688 explorer.exe 35 PID 2688 wrote to memory of 2868 2688 explorer.exe 35 PID 2688 wrote to memory of 2868 2688 explorer.exe 35 PID 2688 wrote to memory of 2868 2688 explorer.exe 35 PID 2728 wrote to memory of 2084 2728 svchost.exe 36 PID 2728 wrote to memory of 2084 2728 svchost.exe 36 PID 2728 wrote to memory of 2084 2728 svchost.exe 36 PID 2728 wrote to memory of 2084 2728 svchost.exe 36 PID 2728 wrote to memory of 1644 2728 svchost.exe 39 PID 2728 wrote to memory of 1644 2728 svchost.exe 39 PID 2728 wrote to memory of 1644 2728 svchost.exe 39 PID 2728 wrote to memory of 1644 2728 svchost.exe 39 PID 2728 wrote to memory of 2004 2728 svchost.exe 41 PID 2728 wrote to memory of 2004 2728 svchost.exe 41 PID 2728 wrote to memory of 2004 2728 svchost.exe 41 PID 2728 wrote to memory of 2004 2728 svchost.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe"C:\Users\Admin\AppData\Local\Temp\62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:24 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:25 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1644
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:26 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2004
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD515812d925016fe50c362f395824c87df
SHA1a4517e9d891c2138c37f578910276edd07ce39b1
SHA2569192d9d5a195333aaa199ef95da034a3f76f65380b96315c7825c3e01f58cb84
SHA512a0df2d311b16e98c3d355fcea6b441dd9e920f8b6518824af601629c19845a4bb37ee9ea60c49f002e2e2bbbbbfd54637c4f3c66958dec5aee342476868f509f
-
Filesize
3.6MB
MD5d52c3b73d1358a5962f347042d9929af
SHA19fa07ec3f828dbb92915a4c856561cfe63bb704d
SHA2566f01e4ece9bde878bdde0159389d3d7c8fd8f785268c96aeec2fc42b9e5c7030
SHA512bb08ed35d41a74e82fc7ab366ead737ccc8f2400721a1c7101d5e5e1924e51298c7aae583eb22e0985fd40456681af7d301de45861e45f60444024b1914882b4
-
Filesize
3.6MB
MD5ac2597054725021b83a87c5407df4e67
SHA1f41024700f38a92920ac899e889e9ebf93289079
SHA256a7b6e845f223b523ccb7b4c4e4b53228c2a801b9a8f1fbb9ec3b8d09ab2a70bc
SHA512675a39490204f9d2d4162e538c55d52cbcd99372870cf1d9367afb2c7a63bfa9449fb2101d6ad76640002ed39aee1487cb8932e02e6cef5219d2d5104b514658