Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 17:43

General

  • Target

    a0e7ed3d122dda4d6a7a8e43c262ec20N.exe

  • Size

    135KB

  • MD5

    a0e7ed3d122dda4d6a7a8e43c262ec20

  • SHA1

    582e84edf9fd3687f844289cd8db17932d7179f1

  • SHA256

    dd2cb275a6b081b68e9e4f441d86fec6a8ff4c76953ddcc6e67168d9d56b1d9d

  • SHA512

    f9a52c01f740040b506e92966164eac6d0a556d673b9f4320d33f6807dc15acb769e7115f6c1d0d58afb856e7b233ec566290c2a750286ee3134e7aa3edbd35d

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVLv6z:UVqoCl/YgjxEufVU0TbTyDDalpv6z

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0e7ed3d122dda4d6a7a8e43c262ec20N.exe
    "C:\Users\Admin\AppData\Local\Temp\a0e7ed3d122dda4d6a7a8e43c262ec20N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1492
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4084
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1836
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3732
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    6fd69e8461703a6010355b29a731bb2d

    SHA1

    14f07bf075c831edc0877a81e1ce2172d15cc9cf

    SHA256

    9057c97cfbc6a312fa641b534137fde9e42b2bf8d714e8b896696d7b30849a19

    SHA512

    dc6abad7c658987026fdeb400cd48949547b6df4edabffd0506956fe8394bcbf4b7409453618e0a881b3bfde231c6e07d710321097f052a8bff532ff2b497ed8

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    ef514a72b3a8d74dac1c7b53c0dbdfa5

    SHA1

    6ed76224a45a71854d76b178bd6f5b6d43c79be7

    SHA256

    a24cc2083cd61340de8e01fbe388d86a464044f0f62cb3c8a11c9c95018f39d0

    SHA512

    8186238bbb441098defb15b2e31a83e11c616cac957313cd8b7d2dc4b515dcef36b0028c5b81ab2d6a8fb248ad10310ad49a01e6a99a83c5fc60a307b64dbebc

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    a7b7359fa046c824e41c5c0f2d52d8e8

    SHA1

    784c62e605e29da8cf644469034ff0272c18fceb

    SHA256

    4cb95344acd7f18af29891fa47d03e31b11a75fe10fc63ac0474ff0edcad06cb

    SHA512

    9640bcf5fe03cbd123ed51c023a7ee818589f400349684444c5bf38d70b92e7d140833dcbeb4f40fd2fae73c484e0018835aa6536c7f4acb9d39bb5e3f031739

  • memory/1284-32-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1492-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1492-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1836-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3732-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4084-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB