Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe
Resource
win10v2004-20240802-en
General
-
Target
62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe
-
Size
3.6MB
-
MD5
7dbbec6df3ed420c7ade36b50d9fd3d8
-
SHA1
e7c08bf3a79343dfb7fda05414535c6a8ef20c42
-
SHA256
62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099
-
SHA512
56dcf4f10414c6d57a1bca6ea484b3355e8f77f06d9090a32649c3a1ec00768c79469f326662afb1f842d70f2cd4fb1e066cc5eabf0febc45a2bcac0afbc9810
-
SSDEEP
98304:ddByXcdnlLwOrI5Vfeg91hZOhkRpsinjx:ddien+OrFuBR6cx
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2104 explorer.exe 2152 spoolsv.exe 2148 svchost.exe 4308 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
pid Process 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2104 explorer.exe 2152 spoolsv.exe 2148 svchost.exe 4308 spoolsv.exe 4308 spoolsv.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe 2104 explorer.exe 2148 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2104 explorer.exe 2148 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 2104 explorer.exe 2104 explorer.exe 2104 explorer.exe 2152 spoolsv.exe 2152 spoolsv.exe 2152 spoolsv.exe 2148 svchost.exe 2148 svchost.exe 2148 svchost.exe 4308 spoolsv.exe 4308 spoolsv.exe 4308 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4068 wrote to memory of 2104 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 86 PID 4068 wrote to memory of 2104 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 86 PID 4068 wrote to memory of 2104 4068 62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe 86 PID 2104 wrote to memory of 2152 2104 explorer.exe 87 PID 2104 wrote to memory of 2152 2104 explorer.exe 87 PID 2104 wrote to memory of 2152 2104 explorer.exe 87 PID 2152 wrote to memory of 2148 2152 spoolsv.exe 89 PID 2152 wrote to memory of 2148 2152 spoolsv.exe 89 PID 2152 wrote to memory of 2148 2152 spoolsv.exe 89 PID 2148 wrote to memory of 4308 2148 svchost.exe 90 PID 2148 wrote to memory of 4308 2148 svchost.exe 90 PID 2148 wrote to memory of 4308 2148 svchost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe"C:\Users\Admin\AppData\Local\Temp\62a4a46ce86d6cb82ca3b5c2d854cd1c70f6b58517d28f970fc3aa77205a4099.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4308
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD51ca63d8c2239b1ef7cf72443a024b581
SHA18474ca7a0c99ff10160ee9487b7d920c99740e3a
SHA256dcd1dd47e20973b0d6d629225bb5b5fe17e2e29d26f49e49049444d15e6d7140
SHA512c87d11634cf5fedbc0503e7a602f78d656e32189514d1835a0ae93149f84a9eff24ba7caf41f10023ca36daa9100eb8d30d922e78c7612ea5de0d536bdb2eade
-
Filesize
3.6MB
MD5c10f27c77200c8b26c8cce8c4dc16c51
SHA103df52d6263dbe177cd76e284378f462a98644a9
SHA2566023a64188ac7d0e47c05d08fd282e2253573fffd8ce93457ac0424ce5c8c62a
SHA51286c797be0ed83f533c28246b66222b7b45d7b695a692aa73697649d04225c43c309fb3379f6330b89494065de2cea59fd7679b55b2d5317f439ab5dfb138dce1
-
Filesize
3.6MB
MD57ee8e2e562e6001f73d334d03f58d37e
SHA1c36b95483d3a085b3dd8b4adfcafde33ba4bb239
SHA25622c1a3f13040b4f33bc5f074f3fec66295336b4bef2eb8e447a8f2996284890a
SHA512078fe7f2940f0710469bcf5b223506c9edebdb9663517570cb286575f7cc8eda48af62337a3a5f51e9904f4f381718f46a35efd3bfa1016fae7e01d152b6461c