Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe
-
Size
135KB
-
MD5
49e2bd561af5bd5c54a47a1640c88990
-
SHA1
8a686a755c846a80e1fa9236f0caee46c8883558
-
SHA256
342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0
-
SHA512
34a5d40921bce3a30149a83f6cbb2178b420947d3195e010dc9355c9aa02ca102bd8a1bd81bde44c216d5fa70e7d87b641b680773191b24c5205c80e56f2209e
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVU4:UVqoCl/YgjxEufVU0TbTyDDalS4
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2472 explorer.exe 1636 spoolsv.exe 4020 svchost.exe 1264 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe 2472 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4020 svchost.exe 2472 explorer.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 2472 explorer.exe 2472 explorer.exe 1636 spoolsv.exe 1636 spoolsv.exe 4020 svchost.exe 4020 svchost.exe 1264 spoolsv.exe 1264 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4000 wrote to memory of 2472 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 82 PID 4000 wrote to memory of 2472 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 82 PID 4000 wrote to memory of 2472 4000 342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe 82 PID 2472 wrote to memory of 1636 2472 explorer.exe 83 PID 2472 wrote to memory of 1636 2472 explorer.exe 83 PID 2472 wrote to memory of 1636 2472 explorer.exe 83 PID 1636 wrote to memory of 4020 1636 spoolsv.exe 84 PID 1636 wrote to memory of 4020 1636 spoolsv.exe 84 PID 1636 wrote to memory of 4020 1636 spoolsv.exe 84 PID 4020 wrote to memory of 1264 4020 svchost.exe 85 PID 4020 wrote to memory of 1264 4020 svchost.exe 85 PID 4020 wrote to memory of 1264 4020 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe"C:\Users\Admin\AppData\Local\Temp\342ee7a03a2e1d1c8368f2ba80fc3e40ddb2df12d6bbe1185432a2f77d0d48c0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4020 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1264
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5bc2d9f8fd1208b25944b9bbfdd9992b8
SHA1b168188f5bf7cb234eacabc9e3b36232c3e6bdb1
SHA25633dcab423e0e1c572240a074edbfe26f9bf4dc912c14a2b7762e3c6733afc7f9
SHA5123135fc2a2a274a9cc15c1a9404e96bd808e5cea498c378b915de405e90b916aca0fd4aa1fe531e2dc5bbc325876685bf7501e98e573cd99638a8e9b0ff9b31a0
-
Filesize
135KB
MD5d0e82b397f644d503b6bc71fc092853b
SHA14da268b4761862b6419556b1665758f3dc0625ba
SHA256eb1eff579924c3c9fd67c7be3059171743148a242d6366619255a93e3bb6058c
SHA512cddc5771f54fb8e428d05ffb07035e3ccb1170ed43558c9bff50b0a4581ed01aed9c007f939d924094c88008d58050bc86fb9b944036d7c22435e32fe4a741a9
-
Filesize
135KB
MD548c81b72ea8962a62ab843b0319dd795
SHA1137cd083478b954280c8fca7e823703038cc40d4
SHA2562560f42e0a16fd66a556bc249a1d838b42e820cf2512f01fb981d1e7487f737c
SHA51265472ee2011f91170d7020b09c3c29610106602821e5f714420f46ff2eec7fa8de3ffd4b0a4d826a22d6aafcfb74e5f7159a209a76dd7977d6661555204078bb