Analysis

  • max time kernel
    120s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 13:21

General

  • Target

    d48e2bdf8cc1f96099c1c0fb91f3b380N.exe

  • Size

    135KB

  • MD5

    d48e2bdf8cc1f96099c1c0fb91f3b380

  • SHA1

    a411fed949a848db5742669fc27cc0ab23d4e140

  • SHA256

    e5187504dbee97940410e574706c302496b94e073c1af6d2fb536e2f36453685

  • SHA512

    46e3487a9aebbade9388eaa096d2e1111b62931df579d1e699c418f6e21a1fac955154d41c5e876c81a74f35ac7900d1a624071d293dc6fe5a464b38808f3d11

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVBYz:UVqoCl/YgjxEufVU0TbTyDDalsz

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d48e2bdf8cc1f96099c1c0fb91f3b380N.exe
    "C:\Users\Admin\AppData\Local\Temp\d48e2bdf8cc1f96099c1c0fb91f3b380N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4612
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4320
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2084
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2668
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1136

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Resources\Themes\explorer.exe

          Filesize

          135KB

          MD5

          0a45773ecdbb6b19ddfd18486d70e7c0

          SHA1

          52422fd8343d13109419d215ad22f0e8a817e716

          SHA256

          7e17e565888bb6c17278c9df95087d8925e324ba69e69fa3aa53dce8c254eada

          SHA512

          f3fdc81afba5ca830a4a085f752ecaace7d4b2ad290e798ae79c44cc84c28e426352f5b5604706a0f8691eb8570f26c4cd78562bba72884dc408ad1e6362fea9

        • C:\Windows\Resources\spoolsv.exe

          Filesize

          135KB

          MD5

          59bbf258b0b501cb3263055ae648ddd0

          SHA1

          4a1215cfb79025a5892d865505bde926873befbf

          SHA256

          b30c9aa48d955cef64adc4ddd42b4ec9d225a24bb171d79a0af97e34b6d25b6a

          SHA512

          ff93815e5440ec3d61dd30d044f7cd57e74cde4cb1dff087b5658e2e48d0d921b05081f46d8b320106ef1dedae94c9bd96bb5e44c9cff1fb6a403057e13e09ec

        • C:\Windows\Resources\svchost.exe

          Filesize

          135KB

          MD5

          b3999cfd9c7c953b32a1decf3a9e5ab4

          SHA1

          0456b41b79ae574058bf5511d7043fbd07f7dd33

          SHA256

          ef648c19b243b600bfde51b8e0c65402dd911e3c703d6584bfb50b8f326bf0ef

          SHA512

          3ff4d3a30a7f665e1b0a38d85c832c19c6c2a6427975f0469eb7e0e9ee75d315ca8e0a858fa8fa88e4a6828c0cc1ca6fe929036d9a28fbfe10875980c57103da

        • memory/1136-33-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2084-34-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2668-37-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/4320-9-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/4320-36-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/4612-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/4612-35-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB