Analysis
-
max time kernel
150s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe
Resource
win10v2004-20240802-en
General
-
Target
218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe
-
Size
135KB
-
MD5
c12a5b6c82549a51a17d21721c8caf00
-
SHA1
77541fff8d907ed504445b643308c09b93ee8e1c
-
SHA256
218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7
-
SHA512
0bc8e5b5dfa23d607d47017f2848bfedd8d84cece4a7c38f36565f1a39c480345ccb111f4b660d507ab94947f68b878abb0e8236c1248c9d60bd402b91908bd5
-
SSDEEP
1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbgDWSGo:XVqoCl/YgjxEufVU0TbTyDDalno
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4880 explorer.exe 4152 spoolsv.exe 1576 svchost.exe 1592 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4880 explorer.exe 1576 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 4880 explorer.exe 4880 explorer.exe 4152 spoolsv.exe 4152 spoolsv.exe 1576 svchost.exe 1576 svchost.exe 1592 spoolsv.exe 1592 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1084 wrote to memory of 4880 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 82 PID 1084 wrote to memory of 4880 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 82 PID 1084 wrote to memory of 4880 1084 218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe 82 PID 4880 wrote to memory of 4152 4880 explorer.exe 83 PID 4880 wrote to memory of 4152 4880 explorer.exe 83 PID 4880 wrote to memory of 4152 4880 explorer.exe 83 PID 4152 wrote to memory of 1576 4152 spoolsv.exe 84 PID 4152 wrote to memory of 1576 4152 spoolsv.exe 84 PID 4152 wrote to memory of 1576 4152 spoolsv.exe 84 PID 1576 wrote to memory of 1592 1576 svchost.exe 85 PID 1576 wrote to memory of 1592 1576 svchost.exe 85 PID 1576 wrote to memory of 1592 1576 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe"C:\Users\Admin\AppData\Local\Temp\218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4152 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5ff8f4c8b77c93b194705a6ce31ebf551
SHA1f5abf5755d970b2252698ad320e4fe8b6c81a7f8
SHA256e4df45ef7f59e6818083f74821f071576108a7fb7a2fac40b491b65b374789fd
SHA512bdc072794d53cb0bfc17b517cd9341f519519dd3e8b47e54d86eae07c7029344832b679411e4093f52dca47c7e312fb6da7e9686ff76d04961ba01c0dd40fd66
-
Filesize
135KB
MD5229f0ce25f9f7ee003715cd050f6e703
SHA1a2534b8f00ad4daa1618f7909af498ae56453cc7
SHA256533872f7ba8b59717e09f015ef400622f57dfb2db6f872ca1a48e8245887d601
SHA512d305e57d0a2349a4f5dbdabbc8be5bdcfec5f9bf81a3b693bfa89d717521de194a70b5fcfc4673b960961c6f9bd299655158ad71de884cf33b377b64b6b1eec6
-
Filesize
135KB
MD523233ccab53043798c91ee6b7e1185dd
SHA1331c16c87913721bc7b1322fe870ab4d3b58a551
SHA25627f3887b718326b0583c92d915a0a395e896b40526cfa3466d799487fb5b6aa4
SHA512d479e1c11480d0834db97bbf79e36a5ec67d557e42f2ee691e286c019c7163c607307b4cda5c97e2377e6bc19447aec741876656f4f4e9858b322a87ce66d3af