Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe
Resource
win10v2004-20240802-en
General
-
Target
fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe
-
Size
135KB
-
MD5
56d1433864ff895e13e9aafdd6efa07b
-
SHA1
cbaf83cc38f333a0366627d339a96aedf615195f
-
SHA256
fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b
-
SHA512
ba88460f70ff34dcac00fe5455c4d121ad312ae6e78fcd1afa5dd63ac6467a69c936cc9ed55740beef026a5b9975e717b74d539a964b46f00fac83f7caa554d6
-
SSDEEP
1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbggiJ9:XVqoCl/YgjxEufVU0TbTyDDalRY9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4844 explorer.exe 3896 spoolsv.exe 1584 svchost.exe 1816 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe 4844 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4844 explorer.exe 1584 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 4844 explorer.exe 4844 explorer.exe 3896 spoolsv.exe 3896 spoolsv.exe 1584 svchost.exe 1584 svchost.exe 1816 spoolsv.exe 1816 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2052 wrote to memory of 4844 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 92 PID 2052 wrote to memory of 4844 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 92 PID 2052 wrote to memory of 4844 2052 fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe 92 PID 4844 wrote to memory of 3896 4844 explorer.exe 93 PID 4844 wrote to memory of 3896 4844 explorer.exe 93 PID 4844 wrote to memory of 3896 4844 explorer.exe 93 PID 3896 wrote to memory of 1584 3896 spoolsv.exe 94 PID 3896 wrote to memory of 1584 3896 spoolsv.exe 94 PID 3896 wrote to memory of 1584 3896 spoolsv.exe 94 PID 1584 wrote to memory of 1816 1584 svchost.exe 95 PID 1584 wrote to memory of 1816 1584 svchost.exe 95 PID 1584 wrote to memory of 1816 1584 svchost.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe"C:\Users\Admin\AppData\Local\Temp\fc32d6d2d68e49c6305d3968dc16198babbc44a14fc09d846b27fbadf29dbe9b.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3896 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1816
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=3864 /prefetch:81⤵PID:4448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5967099d124e07076dfa183e8c968025c
SHA1c5a4da6b62abd21a31cce77761367b8c1bff1008
SHA256a6ffd63760e5b7d4796cf4ba9df0da7882a887cc8be2feca2be2f69bcdbe9572
SHA512b8f63a8c7fbed1605da7fa9e7c0b92773f556f3f0e61c64e486245cabc414cc5ca6b034adcf79d4f145f2194445e00b9edde654a354a30a4a678c261cefab4a2
-
Filesize
135KB
MD5f2fc77ec1fe09554d10c67deddef82ac
SHA17757eb8f29412b3c8143660c24a81f7630f800a3
SHA256d38feaa1de0185b10b2c274413e03eef4dd4b06b3c06922dbf34e012ebf873d3
SHA512ff376b19e76574f91c7da77584b2c01472bb6a59ba2f927498629be5cab81083d50a3f9c4e7a140768da1efa493e22979f3a4dce108b44570c3a852aba0a1f1c
-
Filesize
135KB
MD51eb5dbe536409880ec8e88b92d52d01f
SHA1c45dd32fe703278807d8a23ee9dcbf626fb081a8
SHA256557075af584c1c1c19e521e988cc7437a35dad68af14838e0ea1bf00ab17ad7b
SHA5123fd655da9465e892affc378aad73f5736244c96d7dc49e40d6961953ea9a715dab22195813e7ec83994381532d04fb2ffadf6c148f2d88a151afed084a1e6aa4