Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe
Resource
win10v2004-20240802-en
General
-
Target
1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe
-
Size
135KB
-
MD5
d0a5c53dc39fa7bf974ea5c8e05ee610
-
SHA1
3bb8ba99bb1feca0006edac03ee4661b65150ecd
-
SHA256
1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9
-
SHA512
84e6284292081a05aafa5a075b117d944c35b36145a530d1b74fa872f38c781648b421fd1acc86e4287449a3d2019c1d73b3af2bdd9ba2892848503d87ebc4cb
-
SSDEEP
1536:XfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbgsnu:XVqoCl/YgjxEufVU0TbTyDDalJu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 2740 explorer.exe 2832 spoolsv.exe 2608 svchost.exe 2840 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2740 explorer.exe 2832 spoolsv.exe 2608 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1664 schtasks.exe 2076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2740 explorer.exe 2608 svchost.exe 2608 svchost.exe 2740 explorer.exe 2608 svchost.exe 2740 explorer.exe 2740 explorer.exe 2608 svchost.exe 2740 explorer.exe 2608 svchost.exe 2740 explorer.exe 2608 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2740 explorer.exe 2608 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 2740 explorer.exe 2740 explorer.exe 2832 spoolsv.exe 2832 spoolsv.exe 2608 svchost.exe 2608 svchost.exe 2840 spoolsv.exe 2840 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2740 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 30 PID 2784 wrote to memory of 2740 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 30 PID 2784 wrote to memory of 2740 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 30 PID 2784 wrote to memory of 2740 2784 1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe 30 PID 2740 wrote to memory of 2832 2740 explorer.exe 31 PID 2740 wrote to memory of 2832 2740 explorer.exe 31 PID 2740 wrote to memory of 2832 2740 explorer.exe 31 PID 2740 wrote to memory of 2832 2740 explorer.exe 31 PID 2832 wrote to memory of 2608 2832 spoolsv.exe 32 PID 2832 wrote to memory of 2608 2832 spoolsv.exe 32 PID 2832 wrote to memory of 2608 2832 spoolsv.exe 32 PID 2832 wrote to memory of 2608 2832 spoolsv.exe 32 PID 2608 wrote to memory of 2840 2608 svchost.exe 33 PID 2608 wrote to memory of 2840 2608 svchost.exe 33 PID 2608 wrote to memory of 2840 2608 svchost.exe 33 PID 2608 wrote to memory of 2840 2608 svchost.exe 33 PID 2740 wrote to memory of 3024 2740 explorer.exe 34 PID 2740 wrote to memory of 3024 2740 explorer.exe 34 PID 2740 wrote to memory of 3024 2740 explorer.exe 34 PID 2740 wrote to memory of 3024 2740 explorer.exe 34 PID 2608 wrote to memory of 2076 2608 svchost.exe 35 PID 2608 wrote to memory of 2076 2608 svchost.exe 35 PID 2608 wrote to memory of 2076 2608 svchost.exe 35 PID 2608 wrote to memory of 2076 2608 svchost.exe 35 PID 2608 wrote to memory of 1664 2608 svchost.exe 38 PID 2608 wrote to memory of 1664 2608 svchost.exe 38 PID 2608 wrote to memory of 1664 2608 svchost.exe 38 PID 2608 wrote to memory of 1664 2608 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe"C:\Users\Admin\AppData\Local\Temp\1d2b005bee67fcd60eff8f8721d941482f36fad64b361557b1f5222031e357b9N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:10 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2076
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 18:11 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1664
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD584069cd7eda890f8f3d67868c0d5f0ed
SHA1aabeb05a8d17b3f2f79a56b739c0bac1b00684fa
SHA2560e5aa7f1e5e49bb5d90d852cb9909a9893cba451de89754c4919c0d2057228b6
SHA51271ec3d8993f901ac557d93f0892191a60229e2b79d4fe4d66849e8cdd77a5ecd5453ee414c7bb5e9022a9451c9452b42e15f5541acb34ade9d6e0b858caac3fe
-
Filesize
135KB
MD52ca1f7d17d0bcfbfbb0fae644ed25599
SHA10346e1d18ac7f85950a5b16e44b40fc2c8ee8600
SHA25698c4728ac8405d4deca62d0368ba4e5bbe081d548c9c1c3e32af39afb574212d
SHA512d80e41563b8cb9049b0c0280a8e899b7a990a359732aa53ee8147f5dfbb358f0fae02969daa8f5c18de945198882173e6cc4b4701a925db2cd2255a0eab31ea0
-
Filesize
135KB
MD5f0f2eeb28123a22318cc7f819357bbef
SHA184e873614d58642b9351bbe1ae9ff48c55bcc497
SHA25669f23f5210b6aac3609b2a8c05910ae93d601d00913e1d0924a6436c5ea769e2
SHA5128d93d4967113f2d1f3e982b06152bb87814084a9717df8cf7a260234f5be5166df04b979ac7553d4fe8bf743ec9a2ee65ae7884e1db457c4e63e897ff415e3ba