Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 21:12

General

  • Target

    4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe

  • Size

    135KB

  • MD5

    30e98fd7c6bba9e873e05819a13bfa4e

  • SHA1

    e491f8cfe171f0d73e5a0f7506eaa8e150f812be

  • SHA256

    4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22

  • SHA512

    d85f191149c027ab57ff2b0f55b587cc7f28b7aadf3c6c08cfb45753c046997b5fa7a2f87723b4c008ca0e52985a38ee143d8a9d2cc650d62ebd6de29e2ea914

  • SSDEEP

    1536:4fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVArBZ:4VqoCl/YgjxEufVU0TbTyDDalGZ

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe
    "C:\Users\Admin\AppData\Local\Temp\4f8ec5a23c3029ef37b05a416cf63a6c276c6ea82db3050fe31f0dd27f007e22.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3828
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2652
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1336
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4836
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    f76e31bf8f34825f8d7b0b214670d701

    SHA1

    fee867b8e3e44810ae4999d2de10abadbec47550

    SHA256

    db53e353fb696ba292b35a4d4784fed5214032391e80f0c978bf51251cd20055

    SHA512

    034da2193b560617c66421899d80d150dd1e03ae9faa8775f4acbfa11fdb33d9c383e91c82228a6b383321ac5cca43c8b0c7007b4dfc2a2dd043c5b175789b13

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    383671fe6a4a651e7835ecce0f45c2c7

    SHA1

    69ad41ca3a204fc89b60fab76ec9f75c25e227c5

    SHA256

    5daf87f808194260a13986711e3134e9fe418a41f03d43c3209af6f0154ccf8a

    SHA512

    7e19623d6533e9db0cf9c0be9dd1405a70f59fb56061fd04b8a2b6d8f0704dae9379238cbe96922f7e5dcdc69205c074b99eaff9ac4ac6605e748bcce867ed6a

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    98136aecb060af828a6f137cd31da01e

    SHA1

    5c20c64de99359b2f3c3883ad61366b3aa2d7b86

    SHA256

    85e836e5db0ed68f587ccbbd9e7bec82b7a45c5498154fa9a1a94d65ee5f379e

    SHA512

    948bd0710e1f2ab0926584d013e687e61b9e9eb209900f54f332fa57e1fa2693585c52ce20b598ec73f61b809554e346ba227159961b4920319d87a0f99b00a7

  • memory/1336-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2652-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3828-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3828-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4028-32-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4836-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB