Analysis

  • max time kernel
    150s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 07:26

General

  • Target

    218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe

  • Size

    135KB

  • MD5

    c12a5b6c82549a51a17d21721c8caf00

  • SHA1

    77541fff8d907ed504445b643308c09b93ee8e1c

  • SHA256

    218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7

  • SHA512

    0bc8e5b5dfa23d607d47017f2848bfedd8d84cece4a7c38f36565f1a39c480345ccb111f4b660d507ab94947f68b878abb0e8236c1248c9d60bd402b91908bd5

  • SSDEEP

    1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbgDWSGo:XVqoCl/YgjxEufVU0TbTyDDalno

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe
    "C:\Users\Admin\AppData\Local\Temp\218e9c466321330d999d754655dda79bcbbe9b87305f0dd8c413a7ff6dd491d7N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1084
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4880
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4152
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1576
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    ff8f4c8b77c93b194705a6ce31ebf551

    SHA1

    f5abf5755d970b2252698ad320e4fe8b6c81a7f8

    SHA256

    e4df45ef7f59e6818083f74821f071576108a7fb7a2fac40b491b65b374789fd

    SHA512

    bdc072794d53cb0bfc17b517cd9341f519519dd3e8b47e54d86eae07c7029344832b679411e4093f52dca47c7e312fb6da7e9686ff76d04961ba01c0dd40fd66

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    229f0ce25f9f7ee003715cd050f6e703

    SHA1

    a2534b8f00ad4daa1618f7909af498ae56453cc7

    SHA256

    533872f7ba8b59717e09f015ef400622f57dfb2db6f872ca1a48e8245887d601

    SHA512

    d305e57d0a2349a4f5dbdabbc8be5bdcfec5f9bf81a3b693bfa89d717521de194a70b5fcfc4673b960961c6f9bd299655158ad71de884cf33b377b64b6b1eec6

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    23233ccab53043798c91ee6b7e1185dd

    SHA1

    331c16c87913721bc7b1322fe870ab4d3b58a551

    SHA256

    27f3887b718326b0583c92d915a0a395e896b40526cfa3466d799487fb5b6aa4

    SHA512

    d479e1c11480d0834db97bbf79e36a5ec67d557e42f2ee691e286c019c7163c607307b4cda5c97e2377e6bc19447aec741876656f4f4e9858b322a87ce66d3af

  • memory/1084-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1084-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1576-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1592-32-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4152-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4880-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB