Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
6a33b1596acf9e96bd245ad298120660N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a33b1596acf9e96bd245ad298120660N.exe
Resource
win10v2004-20240802-en
General
-
Target
6a33b1596acf9e96bd245ad298120660N.exe
-
Size
135KB
-
MD5
6a33b1596acf9e96bd245ad298120660
-
SHA1
9c645414335d3cbc255bd960d6c1cfb4ef6d23dc
-
SHA256
f0e5d9e447e7f27be769f30db5b5dadfceded3262ec5c2b2106b30f2611c56f0
-
SHA512
f3a1baa120b4318b9e4661f8064bb385de4b959694a86b296bcf527f410494780a600c894d24b088ccdd3f870dfb0aee13597e1fc9a7bcaecdde3f54db68998b
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVcTpbqr0B:UVqoCl/YgjxEufVU0TbTyDDaliB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2276 explorer.exe 672 spoolsv.exe 2332 svchost.exe 2152 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2200 6a33b1596acf9e96bd245ad298120660N.exe 2276 explorer.exe 672 spoolsv.exe 2332 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 6a33b1596acf9e96bd245ad298120660N.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a33b1596acf9e96bd245ad298120660N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1436 schtasks.exe 492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2276 explorer.exe 2332 svchost.exe 2332 svchost.exe 2276 explorer.exe 2276 explorer.exe 2276 explorer.exe 2332 svchost.exe 2332 svchost.exe 2276 explorer.exe 2332 svchost.exe 2276 explorer.exe 2332 svchost.exe 2276 explorer.exe 2276 explorer.exe 2332 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2332 svchost.exe 2276 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2200 6a33b1596acf9e96bd245ad298120660N.exe 2200 6a33b1596acf9e96bd245ad298120660N.exe 2276 explorer.exe 2276 explorer.exe 672 spoolsv.exe 672 spoolsv.exe 2332 svchost.exe 2332 svchost.exe 2152 spoolsv.exe 2152 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2276 2200 6a33b1596acf9e96bd245ad298120660N.exe 28 PID 2200 wrote to memory of 2276 2200 6a33b1596acf9e96bd245ad298120660N.exe 28 PID 2200 wrote to memory of 2276 2200 6a33b1596acf9e96bd245ad298120660N.exe 28 PID 2200 wrote to memory of 2276 2200 6a33b1596acf9e96bd245ad298120660N.exe 28 PID 2276 wrote to memory of 672 2276 explorer.exe 29 PID 2276 wrote to memory of 672 2276 explorer.exe 29 PID 2276 wrote to memory of 672 2276 explorer.exe 29 PID 2276 wrote to memory of 672 2276 explorer.exe 29 PID 672 wrote to memory of 2332 672 spoolsv.exe 30 PID 672 wrote to memory of 2332 672 spoolsv.exe 30 PID 672 wrote to memory of 2332 672 spoolsv.exe 30 PID 672 wrote to memory of 2332 672 spoolsv.exe 30 PID 2332 wrote to memory of 2152 2332 svchost.exe 31 PID 2332 wrote to memory of 2152 2332 svchost.exe 31 PID 2332 wrote to memory of 2152 2332 svchost.exe 31 PID 2332 wrote to memory of 2152 2332 svchost.exe 31 PID 2276 wrote to memory of 1656 2276 explorer.exe 32 PID 2276 wrote to memory of 1656 2276 explorer.exe 32 PID 2276 wrote to memory of 1656 2276 explorer.exe 32 PID 2276 wrote to memory of 1656 2276 explorer.exe 32 PID 2332 wrote to memory of 1436 2332 svchost.exe 33 PID 2332 wrote to memory of 1436 2332 svchost.exe 33 PID 2332 wrote to memory of 1436 2332 svchost.exe 33 PID 2332 wrote to memory of 1436 2332 svchost.exe 33 PID 2332 wrote to memory of 492 2332 svchost.exe 38 PID 2332 wrote to memory of 492 2332 svchost.exe 38 PID 2332 wrote to memory of 492 2332 svchost.exe 38 PID 2332 wrote to memory of 492 2332 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a33b1596acf9e96bd245ad298120660N.exe"C:\Users\Admin\AppData\Local\Temp\6a33b1596acf9e96bd245ad298120660N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 10:53 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1436
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 10:54 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:492
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:1656
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5cd27ee48c0d38960c0404b42f67ad653
SHA10f7739e49b26add72df1e2f2ea0bf6453029a115
SHA256b1bb4df93de9e46df869fcec309d6f3e31247bde73346ed0ca8e7e309049196e
SHA5126aa007b430b6264634488325da49fe19f8f315adc6d03c91fe214e9f1f5995dc4e14dd830b9d8e7a6284866b1edb9771a32080f83f7affdcd8628f4b5a6573f6
-
Filesize
135KB
MD5917e06a54a6f22ffa5c0b6c7235ab122
SHA15c0c03e22f41102a1a5c63c184b24ac377caeb77
SHA2565b44dce2e0db909752592cffd6b23840416771c487caab4aaae68388e60a9636
SHA5125a9b44a066319b3e6cdbbcffc5af9ce9404063c107ce67c0a4e0aba4993d3e37e93e52a8c93aa8da086403fd70d4783fdcce9d61fc64ff0dd2aaf798c8324268
-
Filesize
135KB
MD53cc04515ab12a920e335cd5c31d8b2d0
SHA1c94973679012444363f619fe6996f5f59d23b44a
SHA256dbf819388ca38e466bf4af56d6210c76ac3c02ad8c3d1b5ecc47b0b2a684115e
SHA5126d4e586a45851fef509bebb8c23fb6dc9e4de7cafb9ff2205005c57ffdadec85444be9e26b81a33d9a6cd31ec5469f4132444dcc01bd720810e61584a2cad2bb