Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 04:50

General

  • Target

    342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe

  • Size

    135KB

  • MD5

    49e2bd561af5bd5c54a47a1640c88990

  • SHA1

    8a686a755c846a80e1fa9236f0caee46c8883558

  • SHA256

    342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0

  • SHA512

    34a5d40921bce3a30149a83f6cbb2178b420947d3195e010dc9355c9aa02ca102bd8a1bd81bde44c216d5fa70e7d87b641b680773191b24c5205c80e56f2209e

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVU4:UVqoCl/YgjxEufVU0TbTyDDalS4

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4000
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2472
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1636
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4020
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    bc2d9f8fd1208b25944b9bbfdd9992b8

    SHA1

    b168188f5bf7cb234eacabc9e3b36232c3e6bdb1

    SHA256

    33dcab423e0e1c572240a074edbfe26f9bf4dc912c14a2b7762e3c6733afc7f9

    SHA512

    3135fc2a2a274a9cc15c1a9404e96bd808e5cea498c378b915de405e90b916aca0fd4aa1fe531e2dc5bbc325876685bf7501e98e573cd99638a8e9b0ff9b31a0

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    d0e82b397f644d503b6bc71fc092853b

    SHA1

    4da268b4761862b6419556b1665758f3dc0625ba

    SHA256

    eb1eff579924c3c9fd67c7be3059171743148a242d6366619255a93e3bb6058c

    SHA512

    cddc5771f54fb8e428d05ffb07035e3ccb1170ed43558c9bff50b0a4581ed01aed9c007f939d924094c88008d58050bc86fb9b944036d7c22435e32fe4a741a9

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    48c81b72ea8962a62ab843b0319dd795

    SHA1

    137cd083478b954280c8fca7e823703038cc40d4

    SHA256

    2560f42e0a16fd66a556bc249a1d838b42e820cf2512f01fb981d1e7487f737c

    SHA512

    65472ee2011f91170d7020b09c3c29610106602821e5f714420f46ff2eec7fa8de3ffd4b0a4d826a22d6aafcfb74e5f7159a209a76dd7977d6661555204078bb

  • memory/1264-32-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1636-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2472-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4000-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4000-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4020-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB