Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe
Resource
win10v2004-20240802-en
General
-
Target
cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe
-
Size
135KB
-
MD5
aacf18b8d8a225aee92342e4639c3e40
-
SHA1
882ae2e6cb61d925cf6b9cecd767ce6e4e30409d
-
SHA256
cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12
-
SHA512
71faf74fffe6d6feca7ea532df586239ec942e9744c87b0435aa6d5814a684be4e171673016feaa8d4bdf810f139f1f8a3a2678c5f87f68ef35a7067e178ae92
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbViEEEEEEEEEEEEEX:UVqoCl/YgjxEufVU0TbTyDDalBH
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 1988 explorer.exe 3464 spoolsv.exe 940 svchost.exe 988 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe 1988 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1988 explorer.exe 940 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 1988 explorer.exe 1988 explorer.exe 3464 spoolsv.exe 3464 spoolsv.exe 940 svchost.exe 940 svchost.exe 988 spoolsv.exe 988 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1988 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 82 PID 2992 wrote to memory of 1988 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 82 PID 2992 wrote to memory of 1988 2992 cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe 82 PID 1988 wrote to memory of 3464 1988 explorer.exe 83 PID 1988 wrote to memory of 3464 1988 explorer.exe 83 PID 1988 wrote to memory of 3464 1988 explorer.exe 83 PID 3464 wrote to memory of 940 3464 spoolsv.exe 84 PID 3464 wrote to memory of 940 3464 spoolsv.exe 84 PID 3464 wrote to memory of 940 3464 spoolsv.exe 84 PID 940 wrote to memory of 988 940 svchost.exe 85 PID 940 wrote to memory of 988 940 svchost.exe 85 PID 940 wrote to memory of 988 940 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe"C:\Users\Admin\AppData\Local\Temp\cf89b31ff72eb94c6ba24a05cf493e19e2b9419158fde8fb3bf1485a1012ea12N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3464 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:940 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:988
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD57c88d2b93008570eaa35d50dea576e77
SHA1837b34674b1cf40a7d6c383196a028823dc2dda9
SHA256ff6efc009a4ff06871f8aac983b5a5e38a2f88bc4c2b4ac7e48052d208e7eb10
SHA512279b65f24a489cf3f0e81f156c73ca6637adabcf8893e4b10a390b1ca40b4899b3597a40fdd91f868f4124b161939a293a6d2a73a509f316f0a970f971ddc2da
-
Filesize
135KB
MD50edf3b58ea2bbe4c677fa1498b7bd72f
SHA151da37dc8e9f5503f6046f759f0faf94b747a99a
SHA25696bf121088c200b838043040d179123b8bae8fe3dba0cb045021eeacae510c41
SHA512cdd088e99e0905974595f0bf7a97ab0b00c6b0092775c76ac0f57c46c447d8ff74e5c7b314c4457ac982f370ff3bdc9a2e5ed2eb760088634c6ed1e5d4edaf0a
-
Filesize
135KB
MD56d27a64ed69fe8aaffed4a0d093e85b5
SHA19329995ebd49cdcacfa35759af01cc7a6f761312
SHA25698dc95721702fb331259e5e79c0ecd83ae9f089aff88db05ca9ed7db3a2b84f6
SHA512a2d8172203585b7b271fbbf34f68c09bcdc2d400c78a580f2842970ce3c16893a7c472a57618a1f2cd9839857430a1330c19f07a271ad11b8557f98711a4f21d