Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe
Resource
win10v2004-20240802-en
General
-
Target
42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe
-
Size
135KB
-
MD5
95b707a7f19c982836eb0e7f2d10a760
-
SHA1
ae486af3b37886b89b3fbc12c792eb2b20409c2a
-
SHA256
42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729
-
SHA512
ae07467d8e2c2b93eaf402eee33678f7625b474ea3e73e2f7054c4c007184bdcca457d7ca2e2c4f19ede51de220f39d554298c408e6845ee93e885cb536860aa
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVIm:UVqoCl/YgjxEufVU0TbTyDDal+m
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 1236 explorer.exe 2408 spoolsv.exe 4408 svchost.exe 1984 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe 1236 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1236 explorer.exe 4408 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 1236 explorer.exe 1236 explorer.exe 2408 spoolsv.exe 2408 spoolsv.exe 4408 svchost.exe 4408 svchost.exe 1984 spoolsv.exe 1984 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3224 wrote to memory of 1236 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 82 PID 3224 wrote to memory of 1236 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 82 PID 3224 wrote to memory of 1236 3224 42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe 82 PID 1236 wrote to memory of 2408 1236 explorer.exe 83 PID 1236 wrote to memory of 2408 1236 explorer.exe 83 PID 1236 wrote to memory of 2408 1236 explorer.exe 83 PID 2408 wrote to memory of 4408 2408 spoolsv.exe 84 PID 2408 wrote to memory of 4408 2408 spoolsv.exe 84 PID 2408 wrote to memory of 4408 2408 spoolsv.exe 84 PID 4408 wrote to memory of 1984 4408 svchost.exe 85 PID 4408 wrote to memory of 1984 4408 svchost.exe 85 PID 4408 wrote to memory of 1984 4408 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe"C:\Users\Admin\AppData\Local\Temp\42417bf0010fab89e267e605100768839e36d37f9b318136b36fd4efa0c95729N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3224 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4408 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD514f328b6da96f7f56b0ea58e05948f5a
SHA1f451b96450351beb5d204f08f3379c9cde282877
SHA25665d50b17cb8a9f29270780787090754bc204603c07da00817ce5e6561bc1efd9
SHA512550d48b5e15b926c3eaa645fcd10842d628d0ecb12333a30f2a04c78d60b6da81639fa46186ea5dae081a60cc3b9f3180af086367ac100f81db0f8e0a5fd5308
-
Filesize
135KB
MD5713da76a497692f8241f34735d51d83b
SHA15000d69622243ad5c34c0112e3fb75ed7a5e828b
SHA25606500c6bba8edbb6e8aa6372cb3c0181283c84bb238ff9ab92f5658aaded272f
SHA512ecbe6c022ca27cf877f48674719cfc10e8246e1afb5d0a872216e1ac19bfc461c9fee61add6244521f03cc122a5b6c32e399210d1db92fb6a1a70fd5c65dcad1
-
Filesize
135KB
MD5f59373b747af6061b16df6c25b3611bb
SHA1d2c8d5fd53d80fabd2f403c84e74ccfa81933329
SHA25643e7d982be9187c43b8e615e67c0d774bc251dfb0f99bc4ab836a9b6f6344410
SHA512af493b9ef7d3f756c0c0e73d8994ed028f93b7623ebc64b9f402c27b0bf5ce2dcc5dccd791e091aff17df63730abfbe6e838c4a9d1f80dc2ddab32280aa6a478