Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 03:26
Static task
static1
Behavioral task
behavioral1
Sample
b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe
Resource
win10v2004-20240802-en
General
-
Target
b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe
-
Size
135KB
-
MD5
a014cfc4caa0ea34943e3f257e4d84b0
-
SHA1
c08640c3f3ba0f4feae91edef3225807578f4aca
-
SHA256
b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccdd
-
SHA512
8102ef018133ffbef1e033eef87e4887cdd619c81296ef7773f5ccaf742c10581f87ec626f0a9f7ada7331d62afae6bdd88acfba4f2bac2bc29b578b0b94bf90
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVdS2:UVqoCl/YgjxEufVU0TbTyDDalrS2
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2956 explorer.exe 972 spoolsv.exe 2024 svchost.exe 2680 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe 2956 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2956 explorer.exe 2024 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 2956 explorer.exe 2956 explorer.exe 972 spoolsv.exe 972 spoolsv.exe 2024 svchost.exe 2024 svchost.exe 2680 spoolsv.exe 2680 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2956 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 89 PID 2060 wrote to memory of 2956 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 89 PID 2060 wrote to memory of 2956 2060 b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe 89 PID 2956 wrote to memory of 972 2956 explorer.exe 90 PID 2956 wrote to memory of 972 2956 explorer.exe 90 PID 2956 wrote to memory of 972 2956 explorer.exe 90 PID 972 wrote to memory of 2024 972 spoolsv.exe 91 PID 972 wrote to memory of 2024 972 spoolsv.exe 91 PID 972 wrote to memory of 2024 972 spoolsv.exe 91 PID 2024 wrote to memory of 2680 2024 svchost.exe 92 PID 2024 wrote to memory of 2680 2024 svchost.exe 92 PID 2024 wrote to memory of 2680 2024 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe"C:\Users\Admin\AppData\Local\Temp\b5b4eeb48afcdafa22ee0f22a09407c49d0b36b4ec3787e7a5089a0297e7ccddN.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=3776 /prefetch:81⤵PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5b08fc2692f5beb825346f9e09d089f1c
SHA102e5455e0a1063363a08056df5963e66f692e8f1
SHA25695a8b3ec3bec50ae08c7c0dcd2f5d294a4748aaeeb3e9f8139c7fd7a40192beb
SHA5127103efdf95af4ece109ceb2ad7af0e2e908ae13b6dbf39078383259eb586cc28e0eb9db76b306911b9907041072c4f739c638e85be069f0306328f7b53944fe3
-
Filesize
135KB
MD5566d96667b786163089e663232bebab4
SHA1d29e9ff8b65fd577e682b026fd48b73694e9d229
SHA25620ec875f81f6a85e550063bd02c7bb450293c928f7364af04fe46e2227dc5b39
SHA512c6ec591f01fd762b88a427dce5899b6726970719995dca1cb2ce7fdaf9f789dc765c3fd6850a8ac7e002dcf5a1ebb1d464819bf3356eb271be16ba07a800d550
-
Filesize
135KB
MD5e6a474d34285677147ec48e40f3cc697
SHA13d7b12f27ae58917e196f2d95dd3214821e761a9
SHA2564a2e1ffe6f7a417561e2edcf8c4d44a1f57be38bae263f1795c88950e12facba
SHA512fe0d8bb51444148a4afd51fb46e97db4e81c0cf1a78e4b787dc3c441e132ad32f83e762ec2bac50a7b14c5713c298bc4b82dc56837bf826e8a97e8b6a019ad58