Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe
Resource
win10v2004-20240910-en
General
-
Target
d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe
-
Size
135KB
-
MD5
39e17c31b535f5a7425fbd51750f6bd0
-
SHA1
52b2d936f2cceaeb387ecc3d2d8f1d7044b587fd
-
SHA256
d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910
-
SHA512
61dfa7192cbf6aa9ab245c8cb450d276c7f0318669a9f96fc88babf523c2362b8b935fd4a331e522111258daaa31fa6cfa9153fd1ff946ccbfc47d50e151cec4
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVElWAo:UVqoCl/YgjxEufVU0TbTyDDalqlWAo
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 1968 explorer.exe 1692 spoolsv.exe 3036 svchost.exe 2080 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe 1968 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1968 explorer.exe 3036 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 1968 explorer.exe 1968 explorer.exe 1692 spoolsv.exe 1692 spoolsv.exe 3036 svchost.exe 3036 svchost.exe 2080 spoolsv.exe 2080 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3560 wrote to memory of 1968 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 84 PID 3560 wrote to memory of 1968 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 84 PID 3560 wrote to memory of 1968 3560 d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe 84 PID 1968 wrote to memory of 1692 1968 explorer.exe 86 PID 1968 wrote to memory of 1692 1968 explorer.exe 86 PID 1968 wrote to memory of 1692 1968 explorer.exe 86 PID 1692 wrote to memory of 3036 1692 spoolsv.exe 87 PID 1692 wrote to memory of 3036 1692 spoolsv.exe 87 PID 1692 wrote to memory of 3036 1692 spoolsv.exe 87 PID 3036 wrote to memory of 2080 3036 svchost.exe 88 PID 3036 wrote to memory of 2080 3036 svchost.exe 88 PID 3036 wrote to memory of 2080 3036 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe"C:\Users\Admin\AppData\Local\Temp\d411b09bf79d41e6ae01c2cddcac478d154ac5baaa0ace2802c52db656b62910N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3560 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2080
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5fc3c47934047b1fa710cbf664fec65e3
SHA10ea1cca6863cd0e6eb6fd8b60018409962b03ff3
SHA2563ac0b5576ba9142c8ac509c8638c54e597f62d12b7dfc398b30f5994533e6067
SHA5121a08f45dd80fddc6be5d163db6cb2a488398d2bdcb03d55790cd405ca837d22afb78a2d515027732dbc703d8824d045c9939068bdc4e8e28d98b003c04e8df14
-
Filesize
135KB
MD5f031e1c4b5fa75c683bfe1b39b47944b
SHA1aa8ea8a3f539cb104ce98b8e77acf1f5506ebb25
SHA25622117e09df683c60bd1979a2ba848b19f2d5596ef0ac8bef69a514e94a355e12
SHA5129047b54012686df26c0331d17c9ebcdfacb82f8ce2950c062ba7a87a6ccdc47d01f54a9ee49e7fc53c651a565c5246815ac784d4d275d16075ce2d3620f33bd4
-
Filesize
135KB
MD591988f2dcd7805f31408de1f938c0f63
SHA1dc7b884b5d3732393233f27e31f953266173564d
SHA2564fa7dc509ed4ba34eef2ec444e7bf85d803b8b863eb4333c6223870edc5b0bac
SHA512cfd744feede5da5837536369110ebdbd16064f2f54000152bd1a77f25e3e26a60e1d5211d5ef4701e15e42c9c51719bb52a17a2dfa486c14badfd36b73037fa5