Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
6ad1a1302253375fcd6c7380f814f620N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6ad1a1302253375fcd6c7380f814f620N.exe
Resource
win10v2004-20240802-en
General
-
Target
6ad1a1302253375fcd6c7380f814f620N.exe
-
Size
206KB
-
MD5
6ad1a1302253375fcd6c7380f814f620
-
SHA1
e8c64500415bf77650034bd8c28fbf7813629be5
-
SHA256
dbac0525cbbbe1bcd566cf2b8cde307e86f8d59edbd9f3e0b4d31d805d260de1
-
SHA512
0ede8a0c5cb66ff1d198ccf095cab9831041aaa79219924fe88448f7a0b9de4c7a451062a8ba1febf5ea5b75dbfd4107a2c7ce7dce0bb038b9a2cf11d8eeaa09
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdIr:/VqoCl/YgjxEufVU0TbTyDDalbs
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1700 explorer.exe 2140 spoolsv.exe 2700 svchost.exe 2864 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 1700 explorer.exe 1700 explorer.exe 2140 spoolsv.exe 2140 spoolsv.exe 2700 svchost.exe 2700 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 6ad1a1302253375fcd6c7380f814f620N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ad1a1302253375fcd6c7380f814f620N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2840 schtasks.exe 2500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 1700 explorer.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 2700 svchost.exe 1700 explorer.exe 1700 explorer.exe 2700 svchost.exe 2700 svchost.exe 1700 explorer.exe 1700 explorer.exe 2700 svchost.exe 1700 explorer.exe 2700 svchost.exe 1700 explorer.exe 2700 svchost.exe 2700 svchost.exe 1700 explorer.exe 2700 svchost.exe 1700 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2700 svchost.exe 1700 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2396 6ad1a1302253375fcd6c7380f814f620N.exe 2396 6ad1a1302253375fcd6c7380f814f620N.exe 1700 explorer.exe 1700 explorer.exe 2140 spoolsv.exe 2140 spoolsv.exe 2700 svchost.exe 2700 svchost.exe 2864 spoolsv.exe 2864 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1700 2396 6ad1a1302253375fcd6c7380f814f620N.exe 30 PID 2396 wrote to memory of 1700 2396 6ad1a1302253375fcd6c7380f814f620N.exe 30 PID 2396 wrote to memory of 1700 2396 6ad1a1302253375fcd6c7380f814f620N.exe 30 PID 2396 wrote to memory of 1700 2396 6ad1a1302253375fcd6c7380f814f620N.exe 30 PID 1700 wrote to memory of 2140 1700 explorer.exe 31 PID 1700 wrote to memory of 2140 1700 explorer.exe 31 PID 1700 wrote to memory of 2140 1700 explorer.exe 31 PID 1700 wrote to memory of 2140 1700 explorer.exe 31 PID 2140 wrote to memory of 2700 2140 spoolsv.exe 32 PID 2140 wrote to memory of 2700 2140 spoolsv.exe 32 PID 2140 wrote to memory of 2700 2140 spoolsv.exe 32 PID 2140 wrote to memory of 2700 2140 spoolsv.exe 32 PID 2700 wrote to memory of 2864 2700 svchost.exe 33 PID 2700 wrote to memory of 2864 2700 svchost.exe 33 PID 2700 wrote to memory of 2864 2700 svchost.exe 33 PID 2700 wrote to memory of 2864 2700 svchost.exe 33 PID 1700 wrote to memory of 2756 1700 explorer.exe 34 PID 1700 wrote to memory of 2756 1700 explorer.exe 34 PID 1700 wrote to memory of 2756 1700 explorer.exe 34 PID 1700 wrote to memory of 2756 1700 explorer.exe 34 PID 2700 wrote to memory of 2840 2700 svchost.exe 35 PID 2700 wrote to memory of 2840 2700 svchost.exe 35 PID 2700 wrote to memory of 2840 2700 svchost.exe 35 PID 2700 wrote to memory of 2840 2700 svchost.exe 35 PID 2700 wrote to memory of 2500 2700 svchost.exe 39 PID 2700 wrote to memory of 2500 2700 svchost.exe 39 PID 2700 wrote to memory of 2500 2700 svchost.exe 39 PID 2700 wrote to memory of 2500 2700 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ad1a1302253375fcd6c7380f814f620N.exe"C:\Users\Admin\AppData\Local\Temp\6ad1a1302253375fcd6c7380f814f620N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 20:53 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 20:54 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2500
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD505a7383c8ab6ecee6abbcfa4ce637608
SHA1e045662d7872a02d2214a8b2891d9c4c32eff723
SHA256d8ce10cda3f7e79d469bccc325ae49d57739f166f66bee20892e395252b77fe5
SHA5121d3f6fbda00044e1ac87dcf1891dc5d5fa4faf224a916db77089ae8a09c2770a5ffb52edab71edb9d8185386c1aaa560ebbf9b0507f4e3eb8062da2d261364df
-
Filesize
206KB
MD543b7064e78c94bc0d826388e47299d29
SHA1a2e19a701be08ac8ba5ca6dce8eadfe012cbbc9d
SHA25692c232edd9b9ee6348ba623a8f83df2d2c38083e8814c43c9c7640db1e963f2b
SHA512c9cb75e5c8de7462c5ec4f5923d9f3b4c9a9f86618a5cffdc6350f25043d600ae27df92124823671f6747ec85b0914092563e8ac056f6c7b676b8fdd7ccdb686
-
Filesize
206KB
MD5a6a32ae6e5fed1365f261446dbfaa405
SHA1d719920d6fbbdd2031225d85b2e8ea3c3553e5ad
SHA256b127e2d24215857a8bce01619e796ee9711dd650969768c975b29dd1c24ca163
SHA512925e544fe1295eaef32f9b53059725c62dbd8df82a725ca38247c88087bd856a875bd1129000fd78a17e9bb662d1460e355149b03e726087b60251b730e54e7f