Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe
Resource
win10v2004-20240802-en
General
-
Target
8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe
-
Size
206KB
-
MD5
818e5d2451bdfd77f1fe4f9eb1c3e7f0
-
SHA1
c39293cf3a97a17bfe652914f1ef203e0a3d7d5c
-
SHA256
8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66ac
-
SHA512
d36d163726b7bbdd9ca4519418e3f0a1ecd500eceae714b3722d6954781da31134c80a074b7caa252939232928b24f1fb8e6d66625f51e91d3d20ca429905423
-
SSDEEP
1536:/fsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJdN:/VqoCl/YgjxEufVU0TbTyDDalbN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 672 explorer.exe 3980 spoolsv.exe 3356 svchost.exe 2440 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe 672 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 672 explorer.exe 3356 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 672 explorer.exe 672 explorer.exe 3980 spoolsv.exe 3980 spoolsv.exe 3356 svchost.exe 3356 svchost.exe 2440 spoolsv.exe 2440 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 516 wrote to memory of 672 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 89 PID 516 wrote to memory of 672 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 89 PID 516 wrote to memory of 672 516 8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe 89 PID 672 wrote to memory of 3980 672 explorer.exe 90 PID 672 wrote to memory of 3980 672 explorer.exe 90 PID 672 wrote to memory of 3980 672 explorer.exe 90 PID 3980 wrote to memory of 3356 3980 spoolsv.exe 91 PID 3980 wrote to memory of 3356 3980 spoolsv.exe 91 PID 3980 wrote to memory of 3356 3980 spoolsv.exe 91 PID 3356 wrote to memory of 2440 3356 svchost.exe 92 PID 3356 wrote to memory of 2440 3356 svchost.exe 92 PID 3356 wrote to memory of 2440 3356 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe"C:\Users\Admin\AppData\Local\Temp\8650cbd4525ed7ccf59b5bb25144f2b14488f1679276327bbe8a6f86c4db66acN.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:516 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3980 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3356 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4100,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4616 /prefetch:81⤵PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD577d1324810b4168ec2c6333baeefea82
SHA1921e89f111513ff78cc6b9bb4e40d4d41a5fa2a8
SHA256c93165145c8fd77b5a6e58dd1232cb62ec7840601e9e049e5ef82661d301bfac
SHA5120f27f0634a4d4cbeb83c02d1e064e32b6057d036c111f93641f0c265985f55ad38977c48cdcbc279951449d43c7c7ddc58e8dbee02cd82980ebd3994791f0196
-
Filesize
206KB
MD578711eb7a0ed7803e53b4f0f09677051
SHA1a97f0699b4f5b09d339a37e9d890b8e0a37f5231
SHA256ea10afb7b0afbc12f5da2f185b14b1f31233f36b7ed0c54b00510fdd9b997783
SHA512b17f7f48294e10dd50e138d7db7a43f97d12e18a5572e8b41b4f59624131c5f1cf908a44830290697c285fe654c8d5a6d013534516aac235ae86c4e53243f4a2
-
Filesize
206KB
MD50e1a23075e2b2e23a48ce817bb88d635
SHA1f91d72771c77f9774c3dfebe5d6b911129a2f8d5
SHA256c9696eaa22c47c1337cd1b151901b5b6311d56468082a55afa76e35f938c7e9d
SHA5121d80b029517d069eb21173c2c8b17edd75e83d7f835c5d57c7ef5063bcd0e091d4d04a4ea4fac4639d9568a098c7d63adf1f05c54c871cda2256477b4b304bf0