Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe
-
Size
135KB
-
MD5
c2867b6bd29ffd8d2d5a81c5c654a4e0
-
SHA1
d8530c94319e46e91d1eb633fb76849b35496ac8
-
SHA256
d59e0bcd2e95d2914fceb2ef1919addeab952a975998ca7111a428b269ccb6bd
-
SHA512
6d4b89a4338408f0f50738168ec303ed0144ec2e9d06795d6d7dc2705b0d735aeb0924760fd16965dda513fbdc9e9c3fba3705f8afebbfdcdd44e2f27b255505
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVHQ:UVqoCl/YgjxEufVU0TbTyDDaldQ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3020 explorer.exe 2356 spoolsv.exe 2716 svchost.exe 2844 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 3020 explorer.exe 2356 spoolsv.exe 2716 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1748 schtasks.exe 2908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 3020 explorer.exe 3020 explorer.exe 3020 explorer.exe 2716 svchost.exe 2716 svchost.exe 2716 svchost.exe 3020 explorer.exe 2716 svchost.exe 3020 explorer.exe 2716 svchost.exe 3020 explorer.exe 3020 explorer.exe 2716 svchost.exe 2716 svchost.exe 3020 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3020 explorer.exe 2716 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 3020 explorer.exe 3020 explorer.exe 2356 spoolsv.exe 2356 spoolsv.exe 2716 svchost.exe 2716 svchost.exe 2844 spoolsv.exe 2844 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3020 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 30 PID 1680 wrote to memory of 3020 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 30 PID 1680 wrote to memory of 3020 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 30 PID 1680 wrote to memory of 3020 1680 c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe 30 PID 3020 wrote to memory of 2356 3020 explorer.exe 31 PID 3020 wrote to memory of 2356 3020 explorer.exe 31 PID 3020 wrote to memory of 2356 3020 explorer.exe 31 PID 3020 wrote to memory of 2356 3020 explorer.exe 31 PID 2356 wrote to memory of 2716 2356 spoolsv.exe 32 PID 2356 wrote to memory of 2716 2356 spoolsv.exe 32 PID 2356 wrote to memory of 2716 2356 spoolsv.exe 32 PID 2356 wrote to memory of 2716 2356 spoolsv.exe 32 PID 2716 wrote to memory of 2844 2716 svchost.exe 33 PID 2716 wrote to memory of 2844 2716 svchost.exe 33 PID 2716 wrote to memory of 2844 2716 svchost.exe 33 PID 2716 wrote to memory of 2844 2716 svchost.exe 33 PID 3020 wrote to memory of 2876 3020 explorer.exe 34 PID 3020 wrote to memory of 2876 3020 explorer.exe 34 PID 3020 wrote to memory of 2876 3020 explorer.exe 34 PID 3020 wrote to memory of 2876 3020 explorer.exe 34 PID 2716 wrote to memory of 2908 2716 svchost.exe 35 PID 2716 wrote to memory of 2908 2716 svchost.exe 35 PID 2716 wrote to memory of 2908 2716 svchost.exe 35 PID 2716 wrote to memory of 2908 2716 svchost.exe 35 PID 2716 wrote to memory of 1748 2716 svchost.exe 39 PID 2716 wrote to memory of 1748 2716 svchost.exe 39 PID 2716 wrote to memory of 1748 2716 svchost.exe 39 PID 2716 wrote to memory of 1748 2716 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe"C:\Users\Admin\AppData\Local\Temp\c2867b6bd29ffd8d2d5a81c5c654a4e0N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:19 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 01:20 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1748
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2876
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5c6c2c8d99a531201e4f9335b04b76c0d
SHA14a6936e8d472ec4a6e0a0e997a98daf76e1bba7b
SHA2569bf1ca6503804f23a9bc1e2f5c22436c2d7cf2a26de763a7e7a2d9766a4f685f
SHA512144e26daf5dbf1dcdf087fcf0311f07e7901a5b8adbbfe01cc3740cd99d1d3da25ce92b9f0e1947052dea128928d7e4a30a944e22ff1f94dc2f5363423916884
-
Filesize
135KB
MD5b127db76cac0621c5a0d3bd53de6a892
SHA186a1d58b7a76c5985b734b3fb9a1bd347adf8d9e
SHA2561375de73f74331613f2c3037f2243b509c18276243e57b7ac2991add443b7e0c
SHA512770a8ef0e3d4e060818ac1c139646767df460745d72084bedec7c977569cfe865e38aeff4090e34dbe6ee16cf2f17ccab47258d97bc747a8a7bea912454f4fb5
-
Filesize
135KB
MD5918fcdd4adc87853e5fc4052337f1dac
SHA1cf531245e22c6227ee5b8a805c5243cf8781ba83
SHA2568c6e4a98b7707885eee5850a8e4cde0c6e26465a8256aa4390a6eb4df57622b3
SHA5128342ea3357223b76624a8195908540bd63a7e90859a62f1c4a629a4eb52f86a95cb916a5f551f3dd4b8a7ed671fefcbc0a66a471f457a2c93d67d58775f501d5