Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
6e12b57fa31dde6e68c697b13e3f2c20N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6e12b57fa31dde6e68c697b13e3f2c20N.exe
Resource
win10v2004-20240802-en
General
-
Target
6e12b57fa31dde6e68c697b13e3f2c20N.exe
-
Size
135KB
-
MD5
6e12b57fa31dde6e68c697b13e3f2c20
-
SHA1
42b6652a12afb53cd8357b03e1573b933acd8e15
-
SHA256
3157844376f1f67efa460820531e495d78f3371d7b10bbd666c6c84909ffc1cb
-
SHA512
0ef1278c3ead46a832978af8aefdc85bc77b3073dca2ff84be703cd5fd6a45acf1a7d3b656d100308062fc01692073363daa9f6fc86bb202cfcbcf6a0f5d3389
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbV8cybW:UVqoCl/YgjxEufVU0TbTyDDalicybW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1068 explorer.exe 1664 spoolsv.exe 2812 svchost.exe 2860 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 6e12b57fa31dde6e68c697b13e3f2c20N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e12b57fa31dde6e68c697b13e3f2c20N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe 1068 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1068 explorer.exe 2812 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 1068 explorer.exe 1068 explorer.exe 1664 spoolsv.exe 1664 spoolsv.exe 2812 svchost.exe 2812 svchost.exe 2860 spoolsv.exe 2860 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1068 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 93 PID 2972 wrote to memory of 1068 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 93 PID 2972 wrote to memory of 1068 2972 6e12b57fa31dde6e68c697b13e3f2c20N.exe 93 PID 1068 wrote to memory of 1664 1068 explorer.exe 94 PID 1068 wrote to memory of 1664 1068 explorer.exe 94 PID 1068 wrote to memory of 1664 1068 explorer.exe 94 PID 1664 wrote to memory of 2812 1664 spoolsv.exe 95 PID 1664 wrote to memory of 2812 1664 spoolsv.exe 95 PID 1664 wrote to memory of 2812 1664 spoolsv.exe 95 PID 2812 wrote to memory of 2860 2812 svchost.exe 96 PID 2812 wrote to memory of 2860 2812 svchost.exe 96 PID 2812 wrote to memory of 2860 2812 svchost.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e12b57fa31dde6e68c697b13e3f2c20N.exe"C:\Users\Admin\AppData\Local\Temp\6e12b57fa31dde6e68c697b13e3f2c20N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1068 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1304,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=1440 /prefetch:81⤵PID:3748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD506cba94369438e923c28c401d71a9ce3
SHA1a627cddf4ef7b5b101220a847f3f96eec46e0487
SHA256c8dfbf600282af05561d8065008b6b0fe91c9c252f7362da40e94c944652ec4f
SHA51245b5d721e35e4a346a7594c3c1f4debe49d9692fd51b2542ec830e0f07d360e073a21caa6f8614d6f308fe16d96817ace562900e96a71e66cb0b02c749c27e1f
-
Filesize
135KB
MD508c4c02dbc44dc3129b7a2fcbf7035a0
SHA10695fd192fdf7e8d847cb750d7a6f0f61192e892
SHA25677ace85b7612e852ef389738ca2b3b9965757a4a78cfb7ee161b6e5e4487e193
SHA5120f0f4c08afc0ccc9d3a2cb055539d3bbab7e7db980dc5672013b6d7352a4351852cc264d32b125a35e9117276dbf4efb8ead3533fb4e6d0c2e60da241dd431b1
-
Filesize
135KB
MD5b564c056712e886131723d908eb058b7
SHA1f1fec4bf6083a7d3ad14b33774523a04b16cd8b6
SHA2569272f4ff46bd871b5c332a7e1d0bb62082cc704b95428ab46c376b381a28c875
SHA512a380dd51974a180fba91aa5d59120f8e3af66661392d8a40a7b1813747e2e54e51bff1006ea0ede12c4bfcd6d1a8c584c6df621a0b1f7321913a6258518b7b47