Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
c60dc3588a378da3b6849a3da4b1a480N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c60dc3588a378da3b6849a3da4b1a480N.exe
Resource
win10v2004-20240802-en
General
-
Target
c60dc3588a378da3b6849a3da4b1a480N.exe
-
Size
206KB
-
MD5
c60dc3588a378da3b6849a3da4b1a480
-
SHA1
7efe96310b1d19c3fc0bf3b19713f079ec20aaba
-
SHA256
bb74ebf51e508fd1c2639175f81970dcbc1d7244245d15adb7f5d4cb1534d62e
-
SHA512
917f1e2e05e4325e88ce3c0f65c425fc2b06487d0b8c22d76ce6a8a4af96214c0959edcf58726fdefe5b3a62fa1dc5d5e533f1f0ed59119f16f9c32cee5c7b9d
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdbrrrrrrrrrrrrR:/VqoCl/YgjxEufVU0TbTyDDalb1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4548 explorer.exe 920 spoolsv.exe 684 svchost.exe 4804 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe c60dc3588a378da3b6849a3da4b1a480N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c60dc3588a378da3b6849a3da4b1a480N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe 4548 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4548 explorer.exe 684 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 4548 explorer.exe 4548 explorer.exe 920 spoolsv.exe 920 spoolsv.exe 684 svchost.exe 684 svchost.exe 4804 spoolsv.exe 4804 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1984 wrote to memory of 4548 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 84 PID 1984 wrote to memory of 4548 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 84 PID 1984 wrote to memory of 4548 1984 c60dc3588a378da3b6849a3da4b1a480N.exe 84 PID 4548 wrote to memory of 920 4548 explorer.exe 86 PID 4548 wrote to memory of 920 4548 explorer.exe 86 PID 4548 wrote to memory of 920 4548 explorer.exe 86 PID 920 wrote to memory of 684 920 spoolsv.exe 87 PID 920 wrote to memory of 684 920 spoolsv.exe 87 PID 920 wrote to memory of 684 920 spoolsv.exe 87 PID 684 wrote to memory of 4804 684 svchost.exe 88 PID 684 wrote to memory of 4804 684 svchost.exe 88 PID 684 wrote to memory of 4804 684 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c60dc3588a378da3b6849a3da4b1a480N.exe"C:\Users\Admin\AppData\Local\Temp\c60dc3588a378da3b6849a3da4b1a480N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4548 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:920 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:684 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4804
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD54edd98f57a1074020c740b9a99791b69
SHA11fb0b606188dd276bc0a9b5d99d092f9f5a9a9e2
SHA2564ec618dcf781d9283b808c4b765205603f56f9808b424d87f1d2f8e127fbfec3
SHA51263ea35707825688adf251356d5df11061c0d4ceacb5df3c6972c77a996c49c03194c4f4b006eee4040826b253b3672d878869b0a1dcff2e38edfaeda76986608
-
Filesize
206KB
MD5d08d48c973394b3b94824c247e8b7a4b
SHA1dc49478375d23d8b121d985776153fafcec43490
SHA256528a8b54945d0973c7a82f758c14ccafc907a4d08bbf430206d328ae483639ba
SHA5126fa440aae9ebf2aa951b3438164d652e87480adcfac9586e218bcdd2c8d627dd0b7e99bcf90aa1218f897a8ee20ef52ca61b077e93aeb72cfbca0ec3d7e5e8e2
-
Filesize
206KB
MD53da524c5a805abc47a75a4e629c87670
SHA1bc53e7e5da855676c833449ec2d40d3be1c92a52
SHA256ede25b048d7fb17d32baadb5932cc0a5a0e5a0c88e615e2c15dc1f8a91c5db60
SHA512c1691bdd0850029f7feca05d94d45c020585703e81d88c72de545aa1aee18b5d60549159af38ea7e9abe1b2635e92d4bc53eebdd2a27f4a39dca42b6ecf13560