Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 09:58
Static task
static1
Behavioral task
behavioral1
Sample
ca228f142a4ece5676607a82665b9fb0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ca228f142a4ece5676607a82665b9fb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ca228f142a4ece5676607a82665b9fb0N.exe
-
Size
206KB
-
MD5
ca228f142a4ece5676607a82665b9fb0
-
SHA1
8d23092f92e49f224d4d99229ab78c92eec97006
-
SHA256
654501eb167cc5bb53ac3f2a9f795ba31db390b5285600a9608d53635a6b1955
-
SHA512
38025b38a27d501702bd38e2d58ffddf0b8d551d610e2faaa6e8ad20fde2957fea45dc8e9458f420fcf6f70d196a4177714c325971f20187b3b4bac2c36e7e37
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdv:/VqoCl/YgjxEufVU0TbTyDDalbv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4680 explorer.exe 1144 spoolsv.exe 4368 svchost.exe 2504 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe ca228f142a4ece5676607a82665b9fb0N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca228f142a4ece5676607a82665b9fb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe 4680 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4680 explorer.exe 4368 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1752 ca228f142a4ece5676607a82665b9fb0N.exe 1752 ca228f142a4ece5676607a82665b9fb0N.exe 4680 explorer.exe 4680 explorer.exe 1144 spoolsv.exe 1144 spoolsv.exe 4368 svchost.exe 4368 svchost.exe 2504 spoolsv.exe 2504 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1752 wrote to memory of 4680 1752 ca228f142a4ece5676607a82665b9fb0N.exe 84 PID 1752 wrote to memory of 4680 1752 ca228f142a4ece5676607a82665b9fb0N.exe 84 PID 1752 wrote to memory of 4680 1752 ca228f142a4ece5676607a82665b9fb0N.exe 84 PID 4680 wrote to memory of 1144 4680 explorer.exe 85 PID 4680 wrote to memory of 1144 4680 explorer.exe 85 PID 4680 wrote to memory of 1144 4680 explorer.exe 85 PID 1144 wrote to memory of 4368 1144 spoolsv.exe 86 PID 1144 wrote to memory of 4368 1144 spoolsv.exe 86 PID 1144 wrote to memory of 4368 1144 spoolsv.exe 86 PID 4368 wrote to memory of 2504 4368 svchost.exe 87 PID 4368 wrote to memory of 2504 4368 svchost.exe 87 PID 4368 wrote to memory of 2504 4368 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca228f142a4ece5676607a82665b9fb0N.exe"C:\Users\Admin\AppData\Local\Temp\ca228f142a4ece5676607a82665b9fb0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4680 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4368 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2504
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD55df27b0af95e08a508d7ea3ca77c6517
SHA1cfc649e90e81308f5724010187ce6b4b252b5641
SHA2567a0a9c84acf15fc6d4197ca96d20a86e2b3fbaa1537ac910ecf2423211060f1e
SHA512b20c5dca5d450353bf1bdee2b12ca13dd9b05f4c317de39b2cf0a9baea7f42c6e373ec689f2af8998fee1bb459eddd6fbd8128d8a48cb93f6c741a0e76f6db5c
-
Filesize
206KB
MD5ed05fc6afef825a015278a8ac58a3df1
SHA1a0e833fc0690e8f199ed95daea069db4fe4aaf1c
SHA256900734f77cd9e40f64dd9ea51fe77e8af951ba0771746a595067d12f39b5b0ee
SHA51218a771e75079b23d6f1bcff3e8011cf84dc200fe8fe6d9dec1cc42f92271a2d9d30a8a500f80e4d0bcc2af94eae1fbc956770c50f6ef9d15f92e21331ff50c12
-
Filesize
206KB
MD540f89eb6490c4791ee0fb74caf88104e
SHA197edf6a134a994147c9a2b697845b9fcce2a0c00
SHA2563d386598b1e5dc3f1c1c7284b9868ce7dabdfa131457bf950c85b472405998d8
SHA512a22d02371c0e84925f20f713219f3e5b00a2ff78e7315a5e67f0113fb82a48e47e5927ba70207e3224054064f2915da845129bd0fa6c109c2749131f4835e68f