Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
b275510857a066767ca6c18dbc0593e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b275510857a066767ca6c18dbc0593e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b275510857a066767ca6c18dbc0593e0N.exe
-
Size
135KB
-
MD5
b275510857a066767ca6c18dbc0593e0
-
SHA1
314dc8db43aa727339749ce1a13d7a919561f0a9
-
SHA256
7c55a9781ca910cd8df430ad4470636059b1bd77314370d0c710ad7904fe2a90
-
SHA512
fa7dd8d26705471888ef71d8312bd2cff46e511d4e3bc0c59ca5c40e05faef5419d1f4e33ace2536945133c1d2a9b232376d6229a90583498ea22adcdf34824b
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVT+0ts:UVqoCl/YgjxEufVU0TbTyDDal0Ss
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2408 explorer.exe 1804 spoolsv.exe 1812 svchost.exe 2328 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2104 b275510857a066767ca6c18dbc0593e0N.exe 2408 explorer.exe 1804 spoolsv.exe 1812 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe b275510857a066767ca6c18dbc0593e0N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b275510857a066767ca6c18dbc0593e0N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2720 schtasks.exe 1096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 1812 svchost.exe 2408 explorer.exe 2408 explorer.exe 2408 explorer.exe 1812 svchost.exe 1812 svchost.exe 2408 explorer.exe 2408 explorer.exe 1812 svchost.exe 1812 svchost.exe 2408 explorer.exe 2408 explorer.exe 1812 svchost.exe 1812 svchost.exe 2408 explorer.exe 2408 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2408 explorer.exe 1812 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2104 b275510857a066767ca6c18dbc0593e0N.exe 2104 b275510857a066767ca6c18dbc0593e0N.exe 2408 explorer.exe 2408 explorer.exe 1804 spoolsv.exe 1804 spoolsv.exe 1812 svchost.exe 1812 svchost.exe 2328 spoolsv.exe 2328 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2408 2104 b275510857a066767ca6c18dbc0593e0N.exe 30 PID 2104 wrote to memory of 2408 2104 b275510857a066767ca6c18dbc0593e0N.exe 30 PID 2104 wrote to memory of 2408 2104 b275510857a066767ca6c18dbc0593e0N.exe 30 PID 2104 wrote to memory of 2408 2104 b275510857a066767ca6c18dbc0593e0N.exe 30 PID 2408 wrote to memory of 1804 2408 explorer.exe 31 PID 2408 wrote to memory of 1804 2408 explorer.exe 31 PID 2408 wrote to memory of 1804 2408 explorer.exe 31 PID 2408 wrote to memory of 1804 2408 explorer.exe 31 PID 1804 wrote to memory of 1812 1804 spoolsv.exe 32 PID 1804 wrote to memory of 1812 1804 spoolsv.exe 32 PID 1804 wrote to memory of 1812 1804 spoolsv.exe 32 PID 1804 wrote to memory of 1812 1804 spoolsv.exe 32 PID 1812 wrote to memory of 2328 1812 svchost.exe 33 PID 1812 wrote to memory of 2328 1812 svchost.exe 33 PID 1812 wrote to memory of 2328 1812 svchost.exe 33 PID 1812 wrote to memory of 2328 1812 svchost.exe 33 PID 2408 wrote to memory of 2868 2408 explorer.exe 34 PID 2408 wrote to memory of 2868 2408 explorer.exe 34 PID 2408 wrote to memory of 2868 2408 explorer.exe 34 PID 2408 wrote to memory of 2868 2408 explorer.exe 34 PID 1812 wrote to memory of 2720 1812 svchost.exe 35 PID 1812 wrote to memory of 2720 1812 svchost.exe 35 PID 1812 wrote to memory of 2720 1812 svchost.exe 35 PID 1812 wrote to memory of 2720 1812 svchost.exe 35 PID 1812 wrote to memory of 1096 1812 svchost.exe 39 PID 1812 wrote to memory of 1096 1812 svchost.exe 39 PID 1812 wrote to memory of 1096 1812 svchost.exe 39 PID 1812 wrote to memory of 1096 1812 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\b275510857a066767ca6c18dbc0593e0N.exe"C:\Users\Admin\AppData\Local\Temp\b275510857a066767ca6c18dbc0593e0N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2328
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:08 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:09 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1096
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5e7adba24126b7facbf00f4a47a232f0c
SHA1330eff65d59148bb1d3838c24724bac7f4aa5d83
SHA2565e6ef22fbd01c72a426da419c7c4380b7b22586d87b09538a4cbf8fdca52cedc
SHA5127023364600edf1c9f1a5ead3e6006026430f10202ac26c4b8a2af6076d9f97ce2dcceca3632a3662a2b27db993b79fba519affe11eb199fa9d60e8251e433769
-
Filesize
135KB
MD573ed00460baa0885a37741f118fceb5e
SHA13faebca47d6e83c51b04fdf17b1eb6b398401573
SHA25622f35e4ee532ccc224d814f7528b2bac99e05d0dce7dfc36089225133e21f6c8
SHA51246bbb08d81153a51af794aeb073ecffeeb29382b32448c1a7bec86d8bdfd4c041cb420a5fe625057de3a328bff098ed5bba861b1225a72d99f8a98fa1063eaf2
-
Filesize
135KB
MD576bdcb175cd66c50da3e130ddfd2b5f3
SHA13475078037463a3acd13c74071abcee060e7cdcb
SHA256e24dc3ad013db22701e494b7bfbf1dee61db7a1b12517f32ff2638903a529643
SHA5121ac36670f0c560422d2040680e2f4ed3fc3cf20eeba63de960441e253e8c6b7d83f4dbc8b689b1a6190fd22b4bff42601e7ba44940064798903cc6458d11ef6e