Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 08:11

General

  • Target

    6ec84828e584896d088cdb01c696a530N.exe

  • Size

    135KB

  • MD5

    6ec84828e584896d088cdb01c696a530

  • SHA1

    cbde1f498d8b98ed20e40b05f2f3cc80296ca466

  • SHA256

    59f059803061e6c230f5f1e6a8e95c8062ece8365378f2dafd385466058ef7a0

  • SHA512

    b1583d7eeac008662326bb5ec1d8ff970fd21c555471de01b5d96b518f639b7f89288c5e6e8e184e79f8ccabe06d8a4f424d77040e303959824e2c05a16af15b

  • SSDEEP

    1536:4fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVwW9:4VqoCl/YgjxEufVU0TbTyDDalSW9

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ec84828e584896d088cdb01c696a530N.exe
    "C:\Users\Admin\AppData\Local\Temp\6ec84828e584896d088cdb01c696a530N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:640
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1152
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5020
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:384
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Resources\Themes\explorer.exe

          Filesize

          135KB

          MD5

          e32b9939c5c8ffbc8aaeaa23d9caea63

          SHA1

          c3a09b00ea0bf446d58bf56142b78b80f4ab62e2

          SHA256

          4f13c63e9581539c188f64c73b1f37c0e57aee85f1b76daa551866f0897c76ce

          SHA512

          32233e7997e44f5721f2ae08e9c62846f87c16051728bc0f44fcbdd3cc5798a9001f0c4fbb727cbf008721fa9300a4d1ed54a6cb753adf9d3899ef5ddb11c484

        • C:\Windows\Resources\spoolsv.exe

          Filesize

          135KB

          MD5

          aaef6c372e6d0e37968e9260853ca707

          SHA1

          a156d2e3e166ff82a44c8c48ecbd0ebae27ea6be

          SHA256

          45b51da325feb830a9dc23e139e912d2c41398d7ca3f21f88ac9aeb510970734

          SHA512

          3ab82a71551985fb28526eacf511b4ad7a91179b0f6ae464866f2f7dadd1a6ff7559efa94890c0734c1832f96a1211a723a31a4cf512aedc38d641db2ee00c18

        • C:\Windows\Resources\svchost.exe

          Filesize

          135KB

          MD5

          3bcbde8ab83e3536e422108b463968e9

          SHA1

          154b860732af34695652fc62b12f576a349b0532

          SHA256

          a061b837ccdc206063f5f784632760e7c84282d807d98db5a842c4a971a45526

          SHA512

          47d612d3143ad26ac0ec50ef1fd214f1f633853b5731d38e82776d5d121563908b5dd360930358463208f57d689f6818759b64f32f32cb764a8c666e1610174b

        • memory/384-36-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/640-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/640-34-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1152-35-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/3056-32-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/5020-33-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB