Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 05:01

General

  • Target

    530219f327f5e00ea04b0245bf6c1690N.exe

  • Size

    135KB

  • MD5

    530219f327f5e00ea04b0245bf6c1690

  • SHA1

    f113be7c72f8ae985db7696e57f8028c33ac5600

  • SHA256

    9458466a01f41f78a2e21cac0a3301793ccaf0474e6947075d1f63e597cdf2e9

  • SHA512

    97fb185b17b19aa2fab3ed6ce3569642601fe161bb67335cfc2d601028a1f6e31589345aedf274c816044eb35c04038d2e9ddcfd02c72a8351026a88f55d2362

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbV6l:UVqoCl/YgjxEufVU0TbTyDDalEl

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\530219f327f5e00ea04b0245bf6c1690N.exe
    "C:\Users\Admin\AppData\Local\Temp\530219f327f5e00ea04b0245bf6c1690N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1564
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4284
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2472
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4440
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    756f4317ab76f510d1cdcfa625caf5eb

    SHA1

    ab8f0b5a28a773eaae7cd1a89bc4fc851f6cdd62

    SHA256

    2dcbc5679fc3f84df6d8557e7f054b78809501dee4eaa66845f2092489d5ba4e

    SHA512

    755c467912c0bc1c4a0e298de5d59fedcdbc8180ab6f3352f3d6c41aa40009a09f3d10724ebda628892287384fdd7430240e9bbd840ad88f13b7ad6e6dd02b19

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    1ea3a060d92c16dd042085318fda09e9

    SHA1

    073f54579e06e6b5efb1246665a23042115cb65e

    SHA256

    a6253b412fcb998284b64a49e55465a8635230fa1e1322e72cd2c35fa4ecef3f

    SHA512

    ba5168723d63fb5cbbc964727915f01f38864c7e28847120d32857c048d5a8361272518c4a8ca0a4e3f2160fb18321758b638cbf0e60c0f65737ef3a4f620e0a

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    b69af5477d851f1641f03e6453db6d1b

    SHA1

    eaa8bb1f0bad82aabcd1d29055145c654dc870d1

    SHA256

    2d29e7faf172a598cdb820b5de452226223690fe2d1fbcbdbeefda9b0c6e92db

    SHA512

    fed19af6c08741514dec4c3fafd9b7f1c1e5d656c98d454b206a9afa7a67e44be1d407cb6ea79360b64b20d605b2610536558c0a7953916b1b3328099639785f

  • memory/1564-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1564-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2472-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3668-32-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4284-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4440-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB