Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe
Resource
win10v2004-20240802-en
General
-
Target
33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe
-
Size
206KB
-
MD5
caa5d030fce8e086b1f92ad8f2081d40
-
SHA1
b77999baa2f166c1f07894fdc1fc8a96d3c4ef81
-
SHA256
33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8a
-
SHA512
f824f6f1ee86943b8e0c9c170146410626d1b0eb071b682fe92bbbd07b05abad668238354b0fac33cb19ffc078921ff0abe0824b267d1b443a870961829c5d07
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJd2:/VqoCl/YgjxEufVU0TbTyDDalb2
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1540 explorer.exe 5092 spoolsv.exe 5024 svchost.exe 3628 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe 1540 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1540 explorer.exe 5024 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 1540 explorer.exe 1540 explorer.exe 5092 spoolsv.exe 5092 spoolsv.exe 5024 svchost.exe 5024 svchost.exe 3628 spoolsv.exe 3628 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5112 wrote to memory of 1540 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 82 PID 5112 wrote to memory of 1540 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 82 PID 5112 wrote to memory of 1540 5112 33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe 82 PID 1540 wrote to memory of 5092 1540 explorer.exe 83 PID 1540 wrote to memory of 5092 1540 explorer.exe 83 PID 1540 wrote to memory of 5092 1540 explorer.exe 83 PID 5092 wrote to memory of 5024 5092 spoolsv.exe 84 PID 5092 wrote to memory of 5024 5092 spoolsv.exe 84 PID 5092 wrote to memory of 5024 5092 spoolsv.exe 84 PID 5024 wrote to memory of 3628 5024 svchost.exe 85 PID 5024 wrote to memory of 3628 5024 svchost.exe 85 PID 5024 wrote to memory of 3628 5024 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe"C:\Users\Admin\AppData\Local\Temp\33ccd86213fe370b911cb18788858ccf4652316ded94699b41a8a3059196ff8aN.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5092 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5ee2f43df173fdf2a1f9477ba012368a9
SHA16406b81bc4a2c35f1169aa4be2390874c6a4b038
SHA256c6b0b527c2d4b9429018721e499824e2370eefe0fba6a6e10623f32d7fbd3c3c
SHA5129e304a8c5ea6b402acdc7de0c775e9eb97a2949b7358736ad4d06d2714eab752b26b5e5bb71cbbe20ff905fd25b5984dcd976eb4e9832c2cb45d4e838442a793
-
Filesize
206KB
MD5ee1bf8382672e9a8a8cc74b19eb8142f
SHA13f318c8326e5ec93b2e764af53fd819e4875ee0b
SHA256de87d782fc35c9fbaa7b012e9f9dc53119f7ca855e36ed5d5ae6f55190d3b1b9
SHA512d786977b167561366778df7ec3dade7d644893adb0ff22a8951248e58a3a8cbe7d6fabc98a5dcc8fccf992067807bbd0d095aa8e7e5be77a95de9c4d8b4334b5
-
Filesize
206KB
MD5008c4bebe93836f4a56119ea8d2cad0b
SHA1808046e0af4c5e5131d741b1fd0d11e25cea28d1
SHA25642d7220ad812cfb792847fcbf4df1f65301ed80754375f69038f591de802756c
SHA512aa115f619fbfdf9f52c02faca8836f7efd273b6e9467b943538b453fa527dde6e5b4b6913086d083a57c73fa42958004c1da43fa499eae78b1d19038ebbb42ee