Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 18:23
Static task
static1
Behavioral task
behavioral1
Sample
e13ac627dc9ed1edc88fd179aead4ec0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e13ac627dc9ed1edc88fd179aead4ec0N.exe
Resource
win10v2004-20240802-en
General
-
Target
e13ac627dc9ed1edc88fd179aead4ec0N.exe
-
Size
206KB
-
MD5
e13ac627dc9ed1edc88fd179aead4ec0
-
SHA1
a08d6acc3b8410453a6f10414dbffe3309cfdd9c
-
SHA256
ab6889d5253a1d7232fe60c4466b15bc7cff53438326e4bb221060b3e50b5a47
-
SHA512
869b4988161e8d7cd4c89f6c4a329d316c008e71665dd458ac87b66a169b9473b977c8524d4ff8eed05e83985a914a7f68fa8b094338210d5e817363b3c5dc57
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJde:/VqoCl/YgjxEufVU0TbTyDDalbe
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 892 explorer.exe 972 spoolsv.exe 940 svchost.exe 1216 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe e13ac627dc9ed1edc88fd179aead4ec0N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e13ac627dc9ed1edc88fd179aead4ec0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe 892 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 892 explorer.exe 940 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 892 explorer.exe 892 explorer.exe 972 spoolsv.exe 972 spoolsv.exe 940 svchost.exe 940 svchost.exe 1216 spoolsv.exe 1216 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2060 wrote to memory of 892 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 84 PID 2060 wrote to memory of 892 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 84 PID 2060 wrote to memory of 892 2060 e13ac627dc9ed1edc88fd179aead4ec0N.exe 84 PID 892 wrote to memory of 972 892 explorer.exe 85 PID 892 wrote to memory of 972 892 explorer.exe 85 PID 892 wrote to memory of 972 892 explorer.exe 85 PID 972 wrote to memory of 940 972 spoolsv.exe 86 PID 972 wrote to memory of 940 972 spoolsv.exe 86 PID 972 wrote to memory of 940 972 spoolsv.exe 86 PID 940 wrote to memory of 1216 940 svchost.exe 87 PID 940 wrote to memory of 1216 940 svchost.exe 87 PID 940 wrote to memory of 1216 940 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e13ac627dc9ed1edc88fd179aead4ec0N.exe"C:\Users\Admin\AppData\Local\Temp\e13ac627dc9ed1edc88fd179aead4ec0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:940 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1216
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD55bf188e8d1b6459c0c7eca6d370cb74e
SHA1fd77cac51129a40bf12fa7bd63a87526dfbad45f
SHA256a9b0f1237b80b484e85a2f9a9b804e6c1888575521e3e3431d1ba0876a360256
SHA5122045356af839adc004a4ef782f7dd9c4fe6b7795988614a806808e260b31330e911c3a527155bf309e0cc16491db699748b344b8643128a2a2681ef62230dd0b
-
Filesize
206KB
MD510eba4c6998e0fe73780830a2ce0fa9d
SHA13c5ae53d9e4c15f9806009139765a3c1419a4d94
SHA256cb2c34fbe08638f147cfc14c2f936ee01166d770dbbe8029a5b7eba7efbce0e4
SHA51268bd1c78d313ee79d3d49e12de59d4e52b79f89d9f443024a9aae82e90bf9ff385a7454603fb8f2ee9c1f101345d3a90b559947d7710ff48e721b30979045597
-
Filesize
206KB
MD545036c0b7ab1414d432dccbab0468720
SHA178ff38ebd096e2e494864ae07499fb9c3b1e68da
SHA256858609ba3919ab7c60e9f7de751b60fa2eaded7a738854bcd40111c9ddd3dde9
SHA51237b439b3a3fe4761a2247ef8216d266521033d23243a1c31f8134e8603324ba15045defc69f4c7aa2b6e46ae7b7f9e5a1a0652efd89ba958579ad3ac94ea9f9f