Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 20:16
Static task
static1
Behavioral task
behavioral1
Sample
2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe
Resource
win10v2004-20240802-en
General
-
Target
2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe
-
Size
2.6MB
-
MD5
97ed9515c06e15d615efdaaa7cd15cf9
-
SHA1
29cfb415b9b439aab5e6e50b182cd77e217c79c0
-
SHA256
2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990
-
SHA512
4f4cb3b790cffe7b445cacb8ddaee7c044f4ba37f9b678dae93b5caea42e4e1b25330c1662f470ab236ce786ce11b3fac3c4b717462b946cf7ddf6db771f71ef
-
SSDEEP
49152:TeS12nRc6C5CEAHD26ICQVt1ULUQRP6a6YPkCLJ37xbIjNyX5Hxzl/J:6S+c6ZEmqCMtmoQRP6aZtnsNq9l/J
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 3800 explorer.exe 2576 spoolsv.exe 1028 svchost.exe 4628 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 35 IoCs
pid Process 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 3800 explorer.exe 2576 spoolsv.exe 1028 svchost.exe 4628 spoolsv.exe 4628 spoolsv.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe 1028 svchost.exe 3800 explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3800 explorer.exe 1028 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 3800 explorer.exe 3800 explorer.exe 3800 explorer.exe 2576 spoolsv.exe 2576 spoolsv.exe 2576 spoolsv.exe 1028 svchost.exe 1028 svchost.exe 1028 svchost.exe 4628 spoolsv.exe 4628 spoolsv.exe 4628 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4276 wrote to memory of 3800 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 85 PID 4276 wrote to memory of 3800 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 85 PID 4276 wrote to memory of 3800 4276 2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe 85 PID 3800 wrote to memory of 2576 3800 explorer.exe 86 PID 3800 wrote to memory of 2576 3800 explorer.exe 86 PID 3800 wrote to memory of 2576 3800 explorer.exe 86 PID 2576 wrote to memory of 1028 2576 spoolsv.exe 88 PID 2576 wrote to memory of 1028 2576 spoolsv.exe 88 PID 2576 wrote to memory of 1028 2576 spoolsv.exe 88 PID 1028 wrote to memory of 4628 1028 svchost.exe 89 PID 1028 wrote to memory of 4628 1028 svchost.exe 89 PID 1028 wrote to memory of 4628 1028 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe"C:\Users\Admin\AppData\Local\Temp\2ca192ab34f7f0895d97fa9d3e16cc3f500572191c8305ef7ab3c79e98fd7990.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4276 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3800 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD56ab29b3de673ffe0f4b0b72c4dc1be30
SHA1f81328b236ee582382d143f0fc972d5369f90c86
SHA256ab4453747bd25436dcb043e14804a17df435fc3717a1d4e9fea2e18e102d572d
SHA5127ebff53ca01ae3cd940dafb980ec95a421ddad51dd1ba3ceab5d9ed6ffaeffb1088f682b106b3d6a8776364514d070704fb3ad8c30c26ec2007c94e4a8871472
-
Filesize
2.6MB
MD55f0b0fbfa91ea7286881af9b3d3d3dce
SHA10cbc4b9025bbac631b48245a20a2df5f895916da
SHA256d80950e2cd011bc7039fa8a5b31cd2fd74697cd3768f6f821e241e4f145799c2
SHA512c46bf3cfab3126e5c8dbe82340137afc32f980101ec5385ac841372e712bd48ef7c0d75a7ac81d360423c40d5e5e917da9eaeaed266372d4d765b989a8b6d957
-
Filesize
2.6MB
MD5cf3e568842d61fa94d6a21c8c8526d9e
SHA1a1d076764dda8b090598e52b97ebc9ecda80916f
SHA256177c768b8e0b45cccddd55316d4c7816fd7b3d28468edf55562b2c3ceaea1ec0
SHA51272e69ad2615f37196fca900d8540a3f166b68c2089c4a5f037a3cc4c6e56a1102f9a65e3d50cd241e100b9166979a26bd4850b6dcc9cedee948b7c0c77757e72