Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe
Resource
win10v2004-20240802-en
General
-
Target
93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe
-
Size
206KB
-
MD5
2734b66b729dbbc18dfa76f098248af0
-
SHA1
c8d9de82cf4217c09b7acee3756b94f93752f744
-
SHA256
93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06
-
SHA512
ed0d9e8afa1d23f12a660281dd7e9010c9f478d96d36f7b5096a72995399089faf73f6ede42c174c95130ba0841b9c068ac2c2ffe3b2172719c4e2af0ab7e406
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdE:/VqoCl/YgjxEufVU0TbTyDDalbE
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3384 explorer.exe 656 spoolsv.exe 1040 svchost.exe 1284 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe 3384 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3384 explorer.exe 1040 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 3384 explorer.exe 3384 explorer.exe 656 spoolsv.exe 656 spoolsv.exe 1040 svchost.exe 1040 svchost.exe 1284 spoolsv.exe 1284 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 640 wrote to memory of 3384 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 89 PID 640 wrote to memory of 3384 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 89 PID 640 wrote to memory of 3384 640 93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe 89 PID 3384 wrote to memory of 656 3384 explorer.exe 90 PID 3384 wrote to memory of 656 3384 explorer.exe 90 PID 3384 wrote to memory of 656 3384 explorer.exe 90 PID 656 wrote to memory of 1040 656 spoolsv.exe 91 PID 656 wrote to memory of 1040 656 spoolsv.exe 91 PID 656 wrote to memory of 1040 656 spoolsv.exe 91 PID 1040 wrote to memory of 1284 1040 svchost.exe 92 PID 1040 wrote to memory of 1284 1040 svchost.exe 92 PID 1040 wrote to memory of 1284 1040 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe"C:\Users\Admin\AppData\Local\Temp\93436b716f7d8267ce971589c392aab5a806c8d86447337d8c9c3005e6f34b06N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3384 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:656 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1284
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4344,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:4228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD55528d4497a876963098f545951645f91
SHA1d27f4b3f6a89ce8de1ef00ca18fc88c9614402a3
SHA256cea30afbf64f653a5680d04e7b7c19d8405f8c92145b2bd9d92874d479c0e051
SHA512dd31d883526b2e33da8de9cd3d7fb5daa503deb32606bef327ce76df3885184fc00ea78f0f33b6e80bf5d2bc230c10bcdfc8518681bfb93129d90b1c15452905
-
Filesize
206KB
MD5a4cfb7cae9fcd5058f6ed51af7821082
SHA1f4a28a3e35a95d8ef175552c5656f4d258fec10c
SHA256f4033106a5e89caa47818bad75ae8922df88816cde9567e97ed4892cce3fd93e
SHA512a87dec8d1f650f2b4be1a1ac42a7167e8a6a6e5107a253ae0015aa5541b436f1dc9efe1af1493a0dc64fe6f4fc4988fdd306a07c4f55f66826e64d4fb71dc068
-
Filesize
206KB
MD5ab71e9535cc2c9c9c6bfce30ee3dad65
SHA1ccd1e3d6b5b5e4bb109879d3260893c7a00f67f4
SHA2562706c651421e1be0469c867082bfd1763cfa9b37a3d7967fdd7b55849a765ea3
SHA51295c34aa3057cf3dcbfaa33b8237baad66be62cce4c3d9ca5a0e160739af49dbfd4ab37e5d687bf9b77d22a6a3cfed318c7795ef69778f614aae3b240fafc85ab