Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
a0e7ed3d122dda4d6a7a8e43c262ec20N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a0e7ed3d122dda4d6a7a8e43c262ec20N.exe
Resource
win10v2004-20240802-en
General
-
Target
a0e7ed3d122dda4d6a7a8e43c262ec20N.exe
-
Size
135KB
-
MD5
a0e7ed3d122dda4d6a7a8e43c262ec20
-
SHA1
582e84edf9fd3687f844289cd8db17932d7179f1
-
SHA256
dd2cb275a6b081b68e9e4f441d86fec6a8ff4c76953ddcc6e67168d9d56b1d9d
-
SHA512
f9a52c01f740040b506e92966164eac6d0a556d673b9f4320d33f6807dc15acb769e7115f6c1d0d58afb856e7b233ec566290c2a750286ee3134e7aa3edbd35d
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVLv6z:UVqoCl/YgjxEufVU0TbTyDDalpv6z
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4084 explorer.exe 1836 spoolsv.exe 3732 svchost.exe 1284 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe a0e7ed3d122dda4d6a7a8e43c262ec20N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0e7ed3d122dda4d6a7a8e43c262ec20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe 4084 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4084 explorer.exe 3732 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 4084 explorer.exe 4084 explorer.exe 1836 spoolsv.exe 1836 spoolsv.exe 3732 svchost.exe 3732 svchost.exe 1284 spoolsv.exe 1284 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1492 wrote to memory of 4084 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 86 PID 1492 wrote to memory of 4084 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 86 PID 1492 wrote to memory of 4084 1492 a0e7ed3d122dda4d6a7a8e43c262ec20N.exe 86 PID 4084 wrote to memory of 1836 4084 explorer.exe 87 PID 4084 wrote to memory of 1836 4084 explorer.exe 87 PID 4084 wrote to memory of 1836 4084 explorer.exe 87 PID 1836 wrote to memory of 3732 1836 spoolsv.exe 88 PID 1836 wrote to memory of 3732 1836 spoolsv.exe 88 PID 1836 wrote to memory of 3732 1836 spoolsv.exe 88 PID 3732 wrote to memory of 1284 3732 svchost.exe 89 PID 3732 wrote to memory of 1284 3732 svchost.exe 89 PID 3732 wrote to memory of 1284 3732 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0e7ed3d122dda4d6a7a8e43c262ec20N.exe"C:\Users\Admin\AppData\Local\Temp\a0e7ed3d122dda4d6a7a8e43c262ec20N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3732 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1284
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD56fd69e8461703a6010355b29a731bb2d
SHA114f07bf075c831edc0877a81e1ce2172d15cc9cf
SHA2569057c97cfbc6a312fa641b534137fde9e42b2bf8d714e8b896696d7b30849a19
SHA512dc6abad7c658987026fdeb400cd48949547b6df4edabffd0506956fe8394bcbf4b7409453618e0a881b3bfde231c6e07d710321097f052a8bff532ff2b497ed8
-
Filesize
135KB
MD5ef514a72b3a8d74dac1c7b53c0dbdfa5
SHA16ed76224a45a71854d76b178bd6f5b6d43c79be7
SHA256a24cc2083cd61340de8e01fbe388d86a464044f0f62cb3c8a11c9c95018f39d0
SHA5128186238bbb441098defb15b2e31a83e11c616cac957313cd8b7d2dc4b515dcef36b0028c5b81ab2d6a8fb248ad10310ad49a01e6a99a83c5fc60a307b64dbebc
-
Filesize
135KB
MD5a7b7359fa046c824e41c5c0f2d52d8e8
SHA1784c62e605e29da8cf644469034ff0272c18fceb
SHA2564cb95344acd7f18af29891fa47d03e31b11a75fe10fc63ac0474ff0edcad06cb
SHA5129640bcf5fe03cbd123ed51c023a7ee818589f400349684444c5bf38d70b92e7d140833dcbeb4f40fd2fae73c484e0018835aa6536c7f4acb9d39bb5e3f031739