Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 04:16
Behavioral task
behavioral1
Sample
c7992e77f55d3694d6ed0abb1f982140N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7992e77f55d3694d6ed0abb1f982140N.exe
Resource
win10v2004-20240802-en
General
-
Target
c7992e77f55d3694d6ed0abb1f982140N.exe
-
Size
144KB
-
MD5
c7992e77f55d3694d6ed0abb1f982140
-
SHA1
a6d97c519c6704eb6106d77ec5f0be368f8e6705
-
SHA256
cc50f507bea9f2fab321c2922ae853baf63bce10070c0fe94b25ff9219e167ca
-
SHA512
115ac7ad40376935d9dac17c0a00b271a7d364f2d3d719bbba035a040a678bd0c395abdcd8aa1e0b8adf958b3d1039cfda7b9d9c9c55cc5bfd87d64de46524b8
-
SSDEEP
1536:NTVK3P8+agjVr+IIexF9u3LcVH9ctz7DOEtOKA+ZKx65LIctBBvTt:5VK3P8jgAIPxF9u73tvDoAKx6l5BBvp
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1172 explorer.exe 2352 spoolsv.exe 3400 svchost.exe 3032 spoolsv.exe -
resource yara_rule behavioral2/memory/468-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0009000000023482-7.dat upx behavioral2/files/0x0008000000023487-13.dat upx behavioral2/files/0x0008000000023489-23.dat upx behavioral2/memory/3032-32-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2352-33-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/468-34-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1172-35-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3400-36-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe c7992e77f55d3694d6ed0abb1f982140N.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7992e77f55d3694d6ed0abb1f982140N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe 1172 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1172 explorer.exe 3400 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 468 c7992e77f55d3694d6ed0abb1f982140N.exe 468 c7992e77f55d3694d6ed0abb1f982140N.exe 1172 explorer.exe 1172 explorer.exe 2352 spoolsv.exe 2352 spoolsv.exe 3400 svchost.exe 3400 svchost.exe 3032 spoolsv.exe 3032 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 468 wrote to memory of 1172 468 c7992e77f55d3694d6ed0abb1f982140N.exe 88 PID 468 wrote to memory of 1172 468 c7992e77f55d3694d6ed0abb1f982140N.exe 88 PID 468 wrote to memory of 1172 468 c7992e77f55d3694d6ed0abb1f982140N.exe 88 PID 1172 wrote to memory of 2352 1172 explorer.exe 89 PID 1172 wrote to memory of 2352 1172 explorer.exe 89 PID 1172 wrote to memory of 2352 1172 explorer.exe 89 PID 2352 wrote to memory of 3400 2352 spoolsv.exe 91 PID 2352 wrote to memory of 3400 2352 spoolsv.exe 91 PID 2352 wrote to memory of 3400 2352 spoolsv.exe 91 PID 3400 wrote to memory of 3032 3400 svchost.exe 92 PID 3400 wrote to memory of 3032 3400 svchost.exe 92 PID 3400 wrote to memory of 3032 3400 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7992e77f55d3694d6ed0abb1f982140N.exe"C:\Users\Admin\AppData\Local\Temp\c7992e77f55d3694d6ed0abb1f982140N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5420b90d871755e009ba29989f70de760
SHA1a8b09c46c570b223677243ecfdbf275d9d5693de
SHA2567fb66e1abf5c03648d23d7122637ceb97c2069dd14c8003bb4e284d2f5b4ebbd
SHA512a05f318770afb4d27bd9c9441e721aaa282c6b76523bdb96e7521753f66a47ba3a3b5247a12e92e888913962b5be34f985e4132a65d1e27c340f7c89ce161e23
-
Filesize
144KB
MD588b3c964e05c0608a772f70b6548c12f
SHA1f180ae8e73c5142e2abf46fbd7801f23dd244130
SHA2564cc9e1f64e527ea789b507694beb9e991163bdd8c20758596dfbedac63b7aef3
SHA5125426457e794834f1998cd2865439b942c05c3ab524667059e6b2de922463cedbfb706c72f1bd18b8670c4f6b5420219b2d52ae92d77ac28015bfe13ea7a4be82
-
Filesize
144KB
MD5da6f32f26ace2dd2f11b2b34efaadd44
SHA1ba077ab38a3fe9cd54905b6387b23307884355f1
SHA25696c61a164e54025575caa549818289d73c01bb71da672e0d1c9e77d613a56d65
SHA512087e51bc191fa6ebf635cd6584f3ea94912f349c8e66c3826c2b8091475d439ae1a2d0eadd891c1efb986d78381295fdda7ed49542978707ab732f354b284b76