Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
59a54ec6c50f3646db7250b74051e6e0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
59a54ec6c50f3646db7250b74051e6e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
59a54ec6c50f3646db7250b74051e6e0N.exe
-
Size
207KB
-
MD5
59a54ec6c50f3646db7250b74051e6e0
-
SHA1
af7488d4607829cbd06fe226b23634c505777070
-
SHA256
fd8985cefe17d2d11e97be83aca747031613d60f02520692fbf82f0141f78d5f
-
SHA512
eb7f1c59ec340ada53727f7407d3ef8d3206f89c668a6f405892e53f23ee62291b14ebd251a7998f7649d5da98a44ea7da6eabf465e7f8c89d07064ada1032d5
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdIs:/VqoCl/YgjxEufVU0TbTyDDalb7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 3428 explorer.exe 556 spoolsv.exe 3216 svchost.exe 4844 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 59a54ec6c50f3646db7250b74051e6e0N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59a54ec6c50f3646db7250b74051e6e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe 3428 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3428 explorer.exe 3216 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 3428 explorer.exe 3428 explorer.exe 556 spoolsv.exe 556 spoolsv.exe 3216 svchost.exe 3216 svchost.exe 4844 spoolsv.exe 4844 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2544 wrote to memory of 3428 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 83 PID 2544 wrote to memory of 3428 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 83 PID 2544 wrote to memory of 3428 2544 59a54ec6c50f3646db7250b74051e6e0N.exe 83 PID 3428 wrote to memory of 556 3428 explorer.exe 85 PID 3428 wrote to memory of 556 3428 explorer.exe 85 PID 3428 wrote to memory of 556 3428 explorer.exe 85 PID 556 wrote to memory of 3216 556 spoolsv.exe 86 PID 556 wrote to memory of 3216 556 spoolsv.exe 86 PID 556 wrote to memory of 3216 556 spoolsv.exe 86 PID 3216 wrote to memory of 4844 3216 svchost.exe 88 PID 3216 wrote to memory of 4844 3216 svchost.exe 88 PID 3216 wrote to memory of 4844 3216 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\59a54ec6c50f3646db7250b74051e6e0N.exe"C:\Users\Admin\AppData\Local\Temp\59a54ec6c50f3646db7250b74051e6e0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3428 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3216 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4844
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5a2ffbcc76801ecc2279655475a86d022
SHA14e5b98b55a92deec40d2d5d55968e0b95e2d2e51
SHA256c7466f2a8f35808f5ac04a1a38e3d1c7070c7f431cb6033a5b741e414b4cdbbd
SHA512f99910d847445fcc7cf3e841f0e909f55c113413dd4a9cdc2b86da66b34bf1fb7876aeea2e465c3a5f6c5db1632bc6cf8ea9ea5b3fa2c58bf906b3f909678b4d
-
Filesize
206KB
MD5f44b0002a79819dbd523df25eafaa2cf
SHA1f51d25434c703fd54d70a3ea011c3bdae46164a8
SHA256de4bb3aa6e60c2dd3649124f6e87399a8b256c5a7cae234a620011af910c2a21
SHA51207db3b7eee5d71f950f1194d3b9048884124e0ad80e9d5a92158117e02dbc4e5718d0183a37d8c9d33534a5233e947da3449f71fc0633d9524fb68497b20cef0
-
Filesize
206KB
MD536573c97761444526859267ef5c1b3b0
SHA1b9ee964f1745466184264332d430d2c65e03831f
SHA256b54f46a090336a8df54177606489b89b83509bc1ee18ca79e528bb73ada30dfa
SHA51215dbc0da4b5a1de75462615e775e37264fac61429f04b9e282ae6081e704fa1e4fceb279424ec8033c942864f8b2616d82391ea852b12fdab64b63430a678346