Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 18:23

General

  • Target

    e13ac627dc9ed1edc88fd179aead4ec0N.exe

  • Size

    206KB

  • MD5

    e13ac627dc9ed1edc88fd179aead4ec0

  • SHA1

    a08d6acc3b8410453a6f10414dbffe3309cfdd9c

  • SHA256

    ab6889d5253a1d7232fe60c4466b15bc7cff53438326e4bb221060b3e50b5a47

  • SHA512

    869b4988161e8d7cd4c89f6c4a329d316c008e71665dd458ac87b66a169b9473b977c8524d4ff8eed05e83985a914a7f68fa8b094338210d5e817363b3c5dc57

  • SSDEEP

    1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJde:/VqoCl/YgjxEufVU0TbTyDDalbe

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e13ac627dc9ed1edc88fd179aead4ec0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e13ac627dc9ed1edc88fd179aead4ec0N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2060
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:892
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:972
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:940
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    206KB

    MD5

    5bf188e8d1b6459c0c7eca6d370cb74e

    SHA1

    fd77cac51129a40bf12fa7bd63a87526dfbad45f

    SHA256

    a9b0f1237b80b484e85a2f9a9b804e6c1888575521e3e3431d1ba0876a360256

    SHA512

    2045356af839adc004a4ef782f7dd9c4fe6b7795988614a806808e260b31330e911c3a527155bf309e0cc16491db699748b344b8643128a2a2681ef62230dd0b

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    206KB

    MD5

    10eba4c6998e0fe73780830a2ce0fa9d

    SHA1

    3c5ae53d9e4c15f9806009139765a3c1419a4d94

    SHA256

    cb2c34fbe08638f147cfc14c2f936ee01166d770dbbe8029a5b7eba7efbce0e4

    SHA512

    68bd1c78d313ee79d3d49e12de59d4e52b79f89d9f443024a9aae82e90bf9ff385a7454603fb8f2ee9c1f101345d3a90b559947d7710ff48e721b30979045597

  • C:\Windows\Resources\svchost.exe

    Filesize

    206KB

    MD5

    45036c0b7ab1414d432dccbab0468720

    SHA1

    78ff38ebd096e2e494864ae07499fb9c3b1e68da

    SHA256

    858609ba3919ab7c60e9f7de751b60fa2eaded7a738854bcd40111c9ddd3dde9

    SHA512

    37b439b3a3fe4761a2247ef8216d266521033d23243a1c31f8134e8603324ba15045defc69f4c7aa2b6e46ae7b7f9e5a1a0652efd89ba958579ad3ac94ea9f9f

  • memory/892-35-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/940-36-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/972-33-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1216-32-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2060-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2060-34-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB