Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe
Resource
win10v2004-20240802-en
General
-
Target
fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe
-
Size
135KB
-
MD5
5cce295f1ee69d425efce8fead025570
-
SHA1
0d8568f147661df587684dac99bc7dd8446da01b
-
SHA256
fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512
-
SHA512
1b11c177fc7747206d8cbdce5a1b9f0ab32db18006cf65e53bff2d3130a0ba3d23dcd124d2d1637ff273b537662a8a93ccf8463b8ff7966f6f77c630a9557ba7
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalAFp9VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVo:UsLqdufVUNDaWa
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2828 explorer.exe 2800 spoolsv.exe 2912 svchost.exe 2768 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2828 explorer.exe 2800 spoolsv.exe 2912 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3008 schtasks.exe 2064 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2828 explorer.exe 2912 svchost.exe 2912 svchost.exe 2828 explorer.exe 2828 explorer.exe 2828 explorer.exe 2912 svchost.exe 2912 svchost.exe 2828 explorer.exe 2912 svchost.exe 2828 explorer.exe 2828 explorer.exe 2912 svchost.exe 2912 svchost.exe 2828 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2912 svchost.exe 2828 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 2828 explorer.exe 2828 explorer.exe 2800 spoolsv.exe 2800 spoolsv.exe 2912 svchost.exe 2912 svchost.exe 2768 spoolsv.exe 2768 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2828 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 30 PID 2704 wrote to memory of 2828 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 30 PID 2704 wrote to memory of 2828 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 30 PID 2704 wrote to memory of 2828 2704 fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe 30 PID 2828 wrote to memory of 2800 2828 explorer.exe 31 PID 2828 wrote to memory of 2800 2828 explorer.exe 31 PID 2828 wrote to memory of 2800 2828 explorer.exe 31 PID 2828 wrote to memory of 2800 2828 explorer.exe 31 PID 2800 wrote to memory of 2912 2800 spoolsv.exe 32 PID 2800 wrote to memory of 2912 2800 spoolsv.exe 32 PID 2800 wrote to memory of 2912 2800 spoolsv.exe 32 PID 2800 wrote to memory of 2912 2800 spoolsv.exe 32 PID 2912 wrote to memory of 2768 2912 svchost.exe 33 PID 2912 wrote to memory of 2768 2912 svchost.exe 33 PID 2912 wrote to memory of 2768 2912 svchost.exe 33 PID 2912 wrote to memory of 2768 2912 svchost.exe 33 PID 2828 wrote to memory of 2624 2828 explorer.exe 34 PID 2828 wrote to memory of 2624 2828 explorer.exe 34 PID 2828 wrote to memory of 2624 2828 explorer.exe 34 PID 2828 wrote to memory of 2624 2828 explorer.exe 34 PID 2912 wrote to memory of 3008 2912 svchost.exe 35 PID 2912 wrote to memory of 3008 2912 svchost.exe 35 PID 2912 wrote to memory of 3008 2912 svchost.exe 35 PID 2912 wrote to memory of 3008 2912 svchost.exe 35 PID 2912 wrote to memory of 2064 2912 svchost.exe 38 PID 2912 wrote to memory of 2064 2912 svchost.exe 38 PID 2912 wrote to memory of 2064 2912 svchost.exe 38 PID 2912 wrote to memory of 2064 2912 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe"C:\Users\Admin\AppData\Local\Temp\fb0ccd8ab9273d7d768043175371ff68a5cc97c577124844e6d3c006b46d5512N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:11 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:12 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2064
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5e6014d7cf8e38374bfa3df8f8ea49f71
SHA12062e4173f79346ce1f5139ba295b713ce81ec0d
SHA25657931f01042e821e5de42a0bf253350f2cd895469176688a05973e41dc829b4c
SHA512b5dc7f12884415dd7b73cca57448b1bde3b11fdd083e7d5f392b89fa913d547f3c02842b060708265e39e0fab66cdc3b7939e2e5b1cebb599b96edf6768156b3
-
Filesize
135KB
MD50d6546a1b0d8750082d69d42dcbf03ad
SHA114186e7fa2cd97e4a9778441a9c082eaab5a817b
SHA256c857fccbcff53b489867ad6f2fd980e22707a6ef43f9cdcc5bcdb6706d2aa620
SHA51220844a0c37784cf508d902239ec7f04a175501cf62d6818008112fa943331fd8bb96c76e0a6600f879e952e92c2d96c70d7636c4a5d1f7fd87a493838b63b671
-
Filesize
135KB
MD565596178f7be7b7ee06c2d5a719f2924
SHA1d388c94b9f0a2c3bdb3cee4ee5acf0898e4081ff
SHA256b01870973e86696a4a59e14210bc0d52ced951e6bde8187b24cfa3d6ba7788c5
SHA5123876ddb7a6d36de0edbf53cec1778b7c9db8c41072b4a5e53c73784dd81a7f406f46ddb473ae1337d92d2e68bf6e015e42c3b31aa4087090af8aee6314fa696e