Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 09:58

General

  • Target

    ca228f142a4ece5676607a82665b9fb0N.exe

  • Size

    206KB

  • MD5

    ca228f142a4ece5676607a82665b9fb0

  • SHA1

    8d23092f92e49f224d4d99229ab78c92eec97006

  • SHA256

    654501eb167cc5bb53ac3f2a9f795ba31db390b5285600a9608d53635a6b1955

  • SHA512

    38025b38a27d501702bd38e2d58ffddf0b8d551d610e2faaa6e8ad20fde2957fea45dc8e9458f420fcf6f70d196a4177714c325971f20187b3b4bac2c36e7e37

  • SSDEEP

    1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdv:/VqoCl/YgjxEufVU0TbTyDDalbv

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca228f142a4ece5676607a82665b9fb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ca228f142a4ece5676607a82665b9fb0N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4680
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1144
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4368
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    206KB

    MD5

    5df27b0af95e08a508d7ea3ca77c6517

    SHA1

    cfc649e90e81308f5724010187ce6b4b252b5641

    SHA256

    7a0a9c84acf15fc6d4197ca96d20a86e2b3fbaa1537ac910ecf2423211060f1e

    SHA512

    b20c5dca5d450353bf1bdee2b12ca13dd9b05f4c317de39b2cf0a9baea7f42c6e373ec689f2af8998fee1bb459eddd6fbd8128d8a48cb93f6c741a0e76f6db5c

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    206KB

    MD5

    ed05fc6afef825a015278a8ac58a3df1

    SHA1

    a0e833fc0690e8f199ed95daea069db4fe4aaf1c

    SHA256

    900734f77cd9e40f64dd9ea51fe77e8af951ba0771746a595067d12f39b5b0ee

    SHA512

    18a771e75079b23d6f1bcff3e8011cf84dc200fe8fe6d9dec1cc42f92271a2d9d30a8a500f80e4d0bcc2af94eae1fbc956770c50f6ef9d15f92e21331ff50c12

  • C:\Windows\Resources\svchost.exe

    Filesize

    206KB

    MD5

    40f89eb6490c4791ee0fb74caf88104e

    SHA1

    97edf6a134a994147c9a2b697845b9fcce2a0c00

    SHA256

    3d386598b1e5dc3f1c1c7284b9868ce7dabdfa131457bf950c85b472405998d8

    SHA512

    a22d02371c0e84925f20f713219f3e5b00a2ff78e7315a5e67f0113fb82a48e47e5927ba70207e3224054064f2915da845129bd0fa6c109c2749131f4835e68f

  • memory/1144-33-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1752-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1752-34-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2504-32-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4368-36-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4680-35-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB