Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 08:19

General

  • Target

    93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe

  • Size

    206KB

  • MD5

    2734b66b729dbbc18dfa76f098248af0

  • SHA1

    c8d9de82cf4217c09b7acee3756b94f93752f744

  • SHA256

    93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06

  • SHA512

    ed0d9e8afa1d23f12a660281dd7e9010c9f478d96d36f7b5096a72995399089faf73f6ede42c174c95130ba0841b9c068ac2c2ffe3b2172719c4e2af0ab7e406

  • SSDEEP

    1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdE:/VqoCl/YgjxEufVU0TbTyDDalbE

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe
    "C:\Users\Admin\AppData\Local\Temp\93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:640
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3384
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:656
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1040
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1284
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4344,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:8
    1⤵
      PID:4228

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Resources\Themes\explorer.exe

      Filesize

      206KB

      MD5

      5528d4497a876963098f545951645f91

      SHA1

      d27f4b3f6a89ce8de1ef00ca18fc88c9614402a3

      SHA256

      cea30afbf64f653a5680d04e7b7c19d8405f8c92145b2bd9d92874d479c0e051

      SHA512

      dd31d883526b2e33da8de9cd3d7fb5daa503deb32606bef327ce76df3885184fc00ea78f0f33b6e80bf5d2bc230c10bcdfc8518681bfb93129d90b1c15452905

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      206KB

      MD5

      a4cfb7cae9fcd5058f6ed51af7821082

      SHA1

      f4a28a3e35a95d8ef175552c5656f4d258fec10c

      SHA256

      f4033106a5e89caa47818bad75ae8922df88816cde9567e97ed4892cce3fd93e

      SHA512

      a87dec8d1f650f2b4be1a1ac42a7167e8a6a6e5107a253ae0015aa5541b436f1dc9efe1af1493a0dc64fe6f4fc4988fdd306a07c4f55f66826e64d4fb71dc068

    • C:\Windows\Resources\svchost.exe

      Filesize

      206KB

      MD5

      ab71e9535cc2c9c9c6bfce30ee3dad65

      SHA1

      ccd1e3d6b5b5e4bb109879d3260893c7a00f67f4

      SHA256

      2706c651421e1be0469c867082bfd1763cfa9b37a3d7967fdd7b55849a765ea3

      SHA512

      95c34aa3057cf3dcbfaa33b8237baad66be62cce4c3d9ca5a0e160739af49dbfd4ab37e5d687bf9b77d22a6a3cfed318c7795ef69778f614aae3b240fafc85ab

    • memory/640-0-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/640-34-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/656-33-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1040-36-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1284-32-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3384-35-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB