Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 22:40

General

  • Target

    d47401e66bfd3dbcfef83132f9d2edd0N.exe

  • Size

    206KB

  • MD5

    d47401e66bfd3dbcfef83132f9d2edd0

  • SHA1

    00161611d77b1f00cc922c4da58cba1bbbf38588

  • SHA256

    f83224e5f5eb40cccb88b4a6b16fd1548e8165cf902674f27a9e22498aa9cfa3

  • SHA512

    4bb50c6f7a3550f2c8b6c1b304d95d9385a808b5f37cdbd870055d5d7121750c7c756540a99a14369dfd3a900723dc72cf66d5320408eaec81dbd132c18cf06c

  • SSDEEP

    1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdI2:/VqoCl/YgjxEufVU0TbTyDDalbb

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d47401e66bfd3dbcfef83132f9d2edd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\d47401e66bfd3dbcfef83132f9d2edd0N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4520
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:8
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4912
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:388
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4220

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Resources\Themes\explorer.exe

          Filesize

          206KB

          MD5

          bb636e069893bb5de4c6e4085880a290

          SHA1

          c4d2cb63b3c12facea758106e734c93036768f85

          SHA256

          c962ab286cfec6f2f81217dfadbf76a7cb0d5e64991e9286e3c8f5d9ae326c0c

          SHA512

          61190ccc6ba53f321f8bc7db7fc01b82c0bd2abbfd0368cf6efc4a76db4095416b2f01716bd45fa30c5a92d1f1e96c2f25be712df189caabd7fe0c50d487e748

        • C:\Windows\Resources\spoolsv.exe

          Filesize

          206KB

          MD5

          736cebcea000bd3627d93811e4004e61

          SHA1

          5ae4228a3beabff7cabe657e09bd1eec6643034f

          SHA256

          766fb49acde1fbf4ca4f68e9fc6dd12bd12fe2a18b60951ad2bb5281388f0386

          SHA512

          7e1fb8ab852aa2d8aca8f0004bf58efb1431ef50ffb971ccfd7ae3eeaea7d51f3406213b52c4bb5859f24ca0febb7b624dc4eca06bcf891894b1487dfde84671

        • C:\Windows\Resources\svchost.exe

          Filesize

          206KB

          MD5

          09128af09150e066b1ab4b5cd704316a

          SHA1

          d2713b81f09486d8afe1c05e50d5d8cfabfc954b

          SHA256

          953365a2042ed55eb324faab2f72dd6bb7a9eacc0b9a833c25fe8e638f628250

          SHA512

          4fa8508d3a8bffde843c1a107c27a0f5fb9cbcb8bc81d21708355311179a1ba4f84223cd61e8724c51da044d6ccb623466d988c05d9933d13217d0570e7f17d4

        • memory/8-35-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/388-36-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4220-32-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4520-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4520-34-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4912-33-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB