Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe
Resource
win10v2004-20240802-en
General
-
Target
f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe
-
Size
1.3MB
-
MD5
ee519eedae6e74d761b3e99947987560
-
SHA1
a023d377da0d10b222639082e54658e5a44ff0e0
-
SHA256
f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141
-
SHA512
38d3098a3526483ba719a9c8432a2d51d6c8d509ac283d09acd6184068380dcfcfb5624dad367369840b52af6763fc8578505db2e58a4511863d1736a876b86c
-
SSDEEP
24576:mNEQeH/VzRhVesGjhPUffhxoKBE9QBS1kFBcYLDF:R/wjR6hjlS1kzfF
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 436 explorer.exe 2912 spoolsv.exe 1920 svchost.exe 2696 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 436 explorer.exe 2912 spoolsv.exe 1920 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 30 IoCs
pid Process 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 436 explorer.exe 436 explorer.exe 2912 spoolsv.exe 1920 svchost.exe 2696 spoolsv.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1572 schtasks.exe 2740 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 1920 svchost.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe 1920 svchost.exe 436 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 436 explorer.exe 1920 svchost.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 2912 spoolsv.exe 2912 spoolsv.exe 2912 spoolsv.exe 1920 svchost.exe 1920 svchost.exe 1920 svchost.exe 2696 spoolsv.exe 2696 spoolsv.exe 2696 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1640 wrote to memory of 436 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 30 PID 1640 wrote to memory of 436 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 30 PID 1640 wrote to memory of 436 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 30 PID 1640 wrote to memory of 436 1640 f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe 30 PID 436 wrote to memory of 2912 436 explorer.exe 31 PID 436 wrote to memory of 2912 436 explorer.exe 31 PID 436 wrote to memory of 2912 436 explorer.exe 31 PID 436 wrote to memory of 2912 436 explorer.exe 31 PID 2912 wrote to memory of 1920 2912 spoolsv.exe 32 PID 2912 wrote to memory of 1920 2912 spoolsv.exe 32 PID 2912 wrote to memory of 1920 2912 spoolsv.exe 32 PID 2912 wrote to memory of 1920 2912 spoolsv.exe 32 PID 1920 wrote to memory of 2696 1920 svchost.exe 33 PID 1920 wrote to memory of 2696 1920 svchost.exe 33 PID 1920 wrote to memory of 2696 1920 svchost.exe 33 PID 1920 wrote to memory of 2696 1920 svchost.exe 33 PID 436 wrote to memory of 2668 436 explorer.exe 34 PID 436 wrote to memory of 2668 436 explorer.exe 34 PID 436 wrote to memory of 2668 436 explorer.exe 34 PID 436 wrote to memory of 2668 436 explorer.exe 34 PID 1920 wrote to memory of 2740 1920 svchost.exe 35 PID 1920 wrote to memory of 2740 1920 svchost.exe 35 PID 1920 wrote to memory of 2740 1920 svchost.exe 35 PID 1920 wrote to memory of 2740 1920 svchost.exe 35 PID 1920 wrote to memory of 1572 1920 svchost.exe 38 PID 1920 wrote to memory of 1572 1920 svchost.exe 38 PID 1920 wrote to memory of 1572 1920 svchost.exe 38 PID 1920 wrote to memory of 1572 1920 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe"C:\Users\Admin\AppData\Local\Temp\f27e220f0e069545cc6d36a0e3416b1bcf6421afd5f892313cb048f928f85141N.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:436 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:55 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2740
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 02:56 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1572
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5064ef6dc4e55bab011c9a18cea50b83b
SHA1e14c81a415eadec0f41a83a1f84b39ebe9854956
SHA256501f4ab3811e4930d160b10487340e79ada6cb5e85d445a5d42db45563d19180
SHA5127ea3fee1435462ce07b498d6fba40179c62a423db739153aa7c900a3a96381e500515e0de8bee735b911de639524c3630ec261c0a73101caa791c89b4ff91812
-
Filesize
1.3MB
MD5214a4f890fc058e13d14fc1c824adfc6
SHA19f1ea4c58efb066e53a72051e7158a5f1e2d0e80
SHA256f18c628ae8a0dcc795c0acfdb8aed6c96be559ce63771f21baa68a730aeacedf
SHA51236aa813ccc1781b2e4938b77511418a5e00df137a58ffe37e36581d87b3f694fd87772394f07b4c4b1b317a6cebeeb0493ab20a621f06b82743cbc24de7dee5d
-
Filesize
1.3MB
MD571f933e4b66c77674e57087b55c6a9fa
SHA1f9efcc37ed8601ce0eb09b419dfa3809f4b9145d
SHA25660724bf74a24e12d6749ed294de03e2e5179770645de646f5943620cda7e517b
SHA512382e6832e67b65186a2e684ecc4e5ff8299e42d9c8e12ec99c5b0085bb1dc995c7174e935caa67815921d4c053509082b727d9d6bfcb4e5a04beac1a39d44e6d