Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 05:01
Static task
static1
Behavioral task
behavioral1
Sample
530219f327f5e00ea04b0245bf6c1690N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
530219f327f5e00ea04b0245bf6c1690N.exe
Resource
win10v2004-20240802-en
General
-
Target
530219f327f5e00ea04b0245bf6c1690N.exe
-
Size
135KB
-
MD5
530219f327f5e00ea04b0245bf6c1690
-
SHA1
f113be7c72f8ae985db7696e57f8028c33ac5600
-
SHA256
9458466a01f41f78a2e21cac0a3301793ccaf0474e6947075d1f63e597cdf2e9
-
SHA512
97fb185b17b19aa2fab3ed6ce3569642601fe161bb67335cfc2d601028a1f6e31589345aedf274c816044eb35c04038d2e9ddcfd02c72a8351026a88f55d2362
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbV6l:UVqoCl/YgjxEufVU0TbTyDDalEl
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 4284 explorer.exe 2472 spoolsv.exe 4440 svchost.exe 3668 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 530219f327f5e00ea04b0245bf6c1690N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 530219f327f5e00ea04b0245bf6c1690N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe 4284 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4284 explorer.exe 4440 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1564 530219f327f5e00ea04b0245bf6c1690N.exe 1564 530219f327f5e00ea04b0245bf6c1690N.exe 4284 explorer.exe 4284 explorer.exe 2472 spoolsv.exe 2472 spoolsv.exe 4440 svchost.exe 4440 svchost.exe 3668 spoolsv.exe 3668 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1564 wrote to memory of 4284 1564 530219f327f5e00ea04b0245bf6c1690N.exe 88 PID 1564 wrote to memory of 4284 1564 530219f327f5e00ea04b0245bf6c1690N.exe 88 PID 1564 wrote to memory of 4284 1564 530219f327f5e00ea04b0245bf6c1690N.exe 88 PID 4284 wrote to memory of 2472 4284 explorer.exe 89 PID 4284 wrote to memory of 2472 4284 explorer.exe 89 PID 4284 wrote to memory of 2472 4284 explorer.exe 89 PID 2472 wrote to memory of 4440 2472 spoolsv.exe 90 PID 2472 wrote to memory of 4440 2472 spoolsv.exe 90 PID 2472 wrote to memory of 4440 2472 spoolsv.exe 90 PID 4440 wrote to memory of 3668 4440 svchost.exe 91 PID 4440 wrote to memory of 3668 4440 svchost.exe 91 PID 4440 wrote to memory of 3668 4440 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\530219f327f5e00ea04b0245bf6c1690N.exe"C:\Users\Admin\AppData\Local\Temp\530219f327f5e00ea04b0245bf6c1690N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4284 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3668
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5756f4317ab76f510d1cdcfa625caf5eb
SHA1ab8f0b5a28a773eaae7cd1a89bc4fc851f6cdd62
SHA2562dcbc5679fc3f84df6d8557e7f054b78809501dee4eaa66845f2092489d5ba4e
SHA512755c467912c0bc1c4a0e298de5d59fedcdbc8180ab6f3352f3d6c41aa40009a09f3d10724ebda628892287384fdd7430240e9bbd840ad88f13b7ad6e6dd02b19
-
Filesize
135KB
MD51ea3a060d92c16dd042085318fda09e9
SHA1073f54579e06e6b5efb1246665a23042115cb65e
SHA256a6253b412fcb998284b64a49e55465a8635230fa1e1322e72cd2c35fa4ecef3f
SHA512ba5168723d63fb5cbbc964727915f01f38864c7e28847120d32857c048d5a8361272518c4a8ca0a4e3f2160fb18321758b638cbf0e60c0f65737ef3a4f620e0a
-
Filesize
135KB
MD5b69af5477d851f1641f03e6453db6d1b
SHA1eaa8bb1f0bad82aabcd1d29055145c654dc870d1
SHA2562d29e7faf172a598cdb820b5de452226223690fe2d1fbcbdbeefda9b0c6e92db
SHA512fed19af6c08741514dec4c3fafd9b7f1c1e5d656c98d454b206a9afa7a67e44be1d407cb6ea79360b64b20d605b2610536558c0a7953916b1b3328099639785f