Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 22:20
Static task
static1
Behavioral task
behavioral1
Sample
c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe
Resource
win10v2004-20240802-en
General
-
Target
c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe
-
Size
206KB
-
MD5
8f01091bade8cb30e0c70da373094c00
-
SHA1
eb67bdf66ce5c8858577693a3599ae3a8b3395e9
-
SHA256
c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3d
-
SHA512
252317db74c0ab78bfb043426dffa186c0096b9d44709004079bf0af142e32414f3f177fa1e2c6d248ac080bea3b203d60bf053c386f93b50c8b034d894756ac
-
SSDEEP
1536:GfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJd3hzzzzzzzzzzzO:GVqoCl/YgjxEufVU0TbTyDDalb3M
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 2696 explorer.exe 2680 spoolsv.exe 1808 svchost.exe 2668 spoolsv.exe -
Loads dropped DLL 8 IoCs
pid Process 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2696 explorer.exe 2696 explorer.exe 2680 spoolsv.exe 2680 spoolsv.exe 1808 svchost.exe 1808 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1396 schtasks.exe 2928 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 2696 explorer.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 1808 svchost.exe 2696 explorer.exe 1808 svchost.exe 2696 explorer.exe 1808 svchost.exe 2696 explorer.exe 2696 explorer.exe 1808 svchost.exe 2696 explorer.exe 1808 svchost.exe 2696 explorer.exe 1808 svchost.exe 2696 explorer.exe 1808 svchost.exe 1808 svchost.exe 2696 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2696 explorer.exe 1808 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 2696 explorer.exe 2696 explorer.exe 2680 spoolsv.exe 2680 spoolsv.exe 1808 svchost.exe 1808 svchost.exe 2668 spoolsv.exe 2668 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2696 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 30 PID 2648 wrote to memory of 2696 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 30 PID 2648 wrote to memory of 2696 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 30 PID 2648 wrote to memory of 2696 2648 c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe 30 PID 2696 wrote to memory of 2680 2696 explorer.exe 31 PID 2696 wrote to memory of 2680 2696 explorer.exe 31 PID 2696 wrote to memory of 2680 2696 explorer.exe 31 PID 2696 wrote to memory of 2680 2696 explorer.exe 31 PID 2680 wrote to memory of 1808 2680 spoolsv.exe 32 PID 2680 wrote to memory of 1808 2680 spoolsv.exe 32 PID 2680 wrote to memory of 1808 2680 spoolsv.exe 32 PID 2680 wrote to memory of 1808 2680 spoolsv.exe 32 PID 1808 wrote to memory of 2668 1808 svchost.exe 33 PID 1808 wrote to memory of 2668 1808 svchost.exe 33 PID 1808 wrote to memory of 2668 1808 svchost.exe 33 PID 1808 wrote to memory of 2668 1808 svchost.exe 33 PID 2696 wrote to memory of 2624 2696 explorer.exe 34 PID 2696 wrote to memory of 2624 2696 explorer.exe 34 PID 2696 wrote to memory of 2624 2696 explorer.exe 34 PID 2696 wrote to memory of 2624 2696 explorer.exe 34 PID 1808 wrote to memory of 1396 1808 svchost.exe 35 PID 1808 wrote to memory of 1396 1808 svchost.exe 35 PID 1808 wrote to memory of 1396 1808 svchost.exe 35 PID 1808 wrote to memory of 1396 1808 svchost.exe 35 PID 1808 wrote to memory of 2928 1808 svchost.exe 38 PID 1808 wrote to memory of 2928 1808 svchost.exe 38 PID 1808 wrote to memory of 2928 1808 svchost.exe 38 PID 1808 wrote to memory of 2928 1808 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe"C:\Users\Admin\AppData\Local\Temp\c816a7616c6629fa1b64d18a6252506e64b33e8b935ec84fb24399485a45ad3dN.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2668
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 22:22 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1396
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 22:23 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2928
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD55b784ea97fdc95b0bc6fccdb70e3d7ae
SHA1ab587cb0fe179fda2abc8070d9ca7a26f1200006
SHA256d3ee9d7030f918d18e04dcba5d918bfeed9ee4cdb2938763e681294311ea2aba
SHA51275cb65570c8238650b8bacf5e9dfe95f4d9a28ba9fc92b167a26c368d2f469cb03aa5024c2a2a70d2066a252f5d90140f0591325c4e9d77165252e4c1d83a920
-
Filesize
206KB
MD5738d47e5f60ed0a65181f36a0c82982a
SHA1e1eb311542916a6bb5e29c476abee5851dc5a003
SHA256e2d586da14c0fa2bedb1ac83307672c21654194bc9817b6f27cf8e3c8fb68713
SHA512de54d2c0160200cb807d679db74c6741242aadb53167b59048321d210335d51826d72cd6ddcfec841894fa5811e05f57f337c797a7ac1c96c750eeb331e4b967
-
Filesize
206KB
MD5da6dc17a4656f5d4d6dd6a499369c250
SHA155c1f13c6a92fcd3a5a60be0781b5a3943bc71d6
SHA256b8d230b992f9f01b2c2e4b01a004b2e24def450af9e0a6d1cc86ebaab6b1d2ff
SHA512e945113001a49c45732c7ae918361631f5f97940035855b8ccc6e3dba6cdab0fe1833a24f53e487466fe5d6219d933bd1c0d062e8735134d4da2f11b17cdd239