Analysis
-
max time kernel
120s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
d66cdbed815fa50e73cb5ec8cc6ed760N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d66cdbed815fa50e73cb5ec8cc6ed760N.exe
Resource
win10v2004-20240802-en
General
-
Target
d66cdbed815fa50e73cb5ec8cc6ed760N.exe
-
Size
1.2MB
-
MD5
d66cdbed815fa50e73cb5ec8cc6ed760
-
SHA1
d0a9fb067e36491e809239f2857cc8d742e3c148
-
SHA256
30f951191ac71bb68d6e1b596a11d8e75a5315bb033e2ac2be9264d65324a1d8
-
SHA512
5da91662427aefcb7df3270561f09d95973ed698cb759dc29f386f3a534b854e5285b528a8fb3fd86ceef1adf9bd34db629380aac9a75a8260648bd5e195f242
-
SSDEEP
24576:Wj+cktriK2PVboYTicnT1SBb//wDKULTrhSFkOTu+FMb:DSPVboYTVABjRGtSFruNb
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 508 explorer.exe 3164 spoolsv.exe 4460 svchost.exe 412 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 31 IoCs
pid Process 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 508 explorer.exe 508 explorer.exe 3164 spoolsv.exe 4460 svchost.exe 412 spoolsv.exe 412 spoolsv.exe 4460 svchost.exe 508 explorer.exe 4460 svchost.exe 508 explorer.exe 4460 svchost.exe 508 explorer.exe 4460 svchost.exe 508 explorer.exe 4460 svchost.exe 508 explorer.exe 4460 svchost.exe 508 explorer.exe 4460 svchost.exe 508 explorer.exe 4460 svchost.exe 508 explorer.exe 4460 svchost.exe 508 explorer.exe 4460 svchost.exe 508 explorer.exe 4460 svchost.exe 508 explorer.exe 4460 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe d66cdbed815fa50e73cb5ec8cc6ed760N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d66cdbed815fa50e73cb5ec8cc6ed760N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 508 explorer.exe 4460 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 508 explorer.exe 508 explorer.exe 508 explorer.exe 3164 spoolsv.exe 3164 spoolsv.exe 3164 spoolsv.exe 4460 svchost.exe 4460 svchost.exe 4460 svchost.exe 412 spoolsv.exe 412 spoolsv.exe 412 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3668 wrote to memory of 508 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 85 PID 3668 wrote to memory of 508 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 85 PID 3668 wrote to memory of 508 3668 d66cdbed815fa50e73cb5ec8cc6ed760N.exe 85 PID 508 wrote to memory of 3164 508 explorer.exe 87 PID 508 wrote to memory of 3164 508 explorer.exe 87 PID 508 wrote to memory of 3164 508 explorer.exe 87 PID 3164 wrote to memory of 4460 3164 spoolsv.exe 89 PID 3164 wrote to memory of 4460 3164 spoolsv.exe 89 PID 3164 wrote to memory of 4460 3164 spoolsv.exe 89 PID 4460 wrote to memory of 412 4460 svchost.exe 90 PID 4460 wrote to memory of 412 4460 svchost.exe 90 PID 4460 wrote to memory of 412 4460 svchost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d66cdbed815fa50e73cb5ec8cc6ed760N.exe"C:\Users\Admin\AppData\Local\Temp\d66cdbed815fa50e73cb5ec8cc6ed760N.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:508 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:412
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56de56a0f8e553f34837cbc9cd7c413f3
SHA1b94c615c47e2c2e3bc30eaa4c500529ea89b7341
SHA256fd574a41497ecd22fe6691b4e05dd6c73ab527c99c154ec380f50e2dc225d9e3
SHA512596762628bb7a7d52737ad4886eed0df1aa6deed2fcca10d77811bb0cf38a06dc549c0b8c13165ac9ca2faa009791d80435c02695739db806663e36e342f8de1
-
Filesize
1.2MB
MD560a20890c4a4f7852586ff79e684c63a
SHA1a87a1dcdce612d79f6009b78f33e415306308f3d
SHA25629ec200b47f9c5723d808fb8ce9fd6ab8d8e28d61150d50a7bf9c74a55bdbf58
SHA512920a59ae9ac7dc5e5aa30df867c7299680d6590c6f738db3659a0e7063ff81e932b11832634f332acb2dca798419a8960da1dbb41384e5738026fe838e08fd6b
-
Filesize
1.2MB
MD59546abc8361f50e2c676f886314fe0ca
SHA1ade9b4f8118b1d6f7595f0c3bcd89c08e8939241
SHA256c187abc18b5368eb596c998bdd3078314a6bc0e6338919ede6f961aec59233c0
SHA51241782ba2d9e08bd97cdbfe8a562b19587448a54ea942a19ce3151a5b17d5e9e271c938e4ae7037c9411c0d2ca7d3ad13e5a2fd54a38c42d4e866c71c169ebeda