Analysis
-
max time kernel
120s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
d48e2bdf8cc1f96099c1c0fb91f3b380N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d48e2bdf8cc1f96099c1c0fb91f3b380N.exe
Resource
win10v2004-20240802-en
General
-
Target
d48e2bdf8cc1f96099c1c0fb91f3b380N.exe
-
Size
135KB
-
MD5
d48e2bdf8cc1f96099c1c0fb91f3b380
-
SHA1
a411fed949a848db5742669fc27cc0ab23d4e140
-
SHA256
e5187504dbee97940410e574706c302496b94e073c1af6d2fb536e2f36453685
-
SHA512
46e3487a9aebbade9388eaa096d2e1111b62931df579d1e699c418f6e21a1fac955154d41c5e876c81a74f35ac7900d1a624071d293dc6fe5a464b38808f3d11
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVBYz:UVqoCl/YgjxEufVU0TbTyDDalsz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4320 explorer.exe 2084 spoolsv.exe 2668 svchost.exe 1136 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe d48e2bdf8cc1f96099c1c0fb91f3b380N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d48e2bdf8cc1f96099c1c0fb91f3b380N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe 4320 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4320 explorer.exe 2668 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 4320 explorer.exe 4320 explorer.exe 2084 spoolsv.exe 2084 spoolsv.exe 2668 svchost.exe 2668 svchost.exe 1136 spoolsv.exe 1136 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4612 wrote to memory of 4320 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 84 PID 4612 wrote to memory of 4320 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 84 PID 4612 wrote to memory of 4320 4612 d48e2bdf8cc1f96099c1c0fb91f3b380N.exe 84 PID 4320 wrote to memory of 2084 4320 explorer.exe 86 PID 4320 wrote to memory of 2084 4320 explorer.exe 86 PID 4320 wrote to memory of 2084 4320 explorer.exe 86 PID 2084 wrote to memory of 2668 2084 spoolsv.exe 87 PID 2084 wrote to memory of 2668 2084 spoolsv.exe 87 PID 2084 wrote to memory of 2668 2084 spoolsv.exe 87 PID 2668 wrote to memory of 1136 2668 svchost.exe 88 PID 2668 wrote to memory of 1136 2668 svchost.exe 88 PID 2668 wrote to memory of 1136 2668 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d48e2bdf8cc1f96099c1c0fb91f3b380N.exe"C:\Users\Admin\AppData\Local\Temp\d48e2bdf8cc1f96099c1c0fb91f3b380N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4612 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4320 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1136
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD50a45773ecdbb6b19ddfd18486d70e7c0
SHA152422fd8343d13109419d215ad22f0e8a817e716
SHA2567e17e565888bb6c17278c9df95087d8925e324ba69e69fa3aa53dce8c254eada
SHA512f3fdc81afba5ca830a4a085f752ecaace7d4b2ad290e798ae79c44cc84c28e426352f5b5604706a0f8691eb8570f26c4cd78562bba72884dc408ad1e6362fea9
-
Filesize
135KB
MD559bbf258b0b501cb3263055ae648ddd0
SHA14a1215cfb79025a5892d865505bde926873befbf
SHA256b30c9aa48d955cef64adc4ddd42b4ec9d225a24bb171d79a0af97e34b6d25b6a
SHA512ff93815e5440ec3d61dd30d044f7cd57e74cde4cb1dff087b5658e2e48d0d921b05081f46d8b320106ef1dedae94c9bd96bb5e44c9cff1fb6a403057e13e09ec
-
Filesize
135KB
MD5b3999cfd9c7c953b32a1decf3a9e5ab4
SHA10456b41b79ae574058bf5511d7043fbd07f7dd33
SHA256ef648c19b243b600bfde51b8e0c65402dd911e3c703d6584bfb50b8f326bf0ef
SHA5123ff4d3a30a7f665e1b0a38d85c832c19c6c2a6427975f0469eb7e0e9ee75d315ca8e0a858fa8fa88e4a6828c0cc1ca6fe929036d9a28fbfe10875980c57103da