Analysis

  • max time kernel
    120s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2024 13:03

General

  • Target

    9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe

  • Size

    178KB

  • MD5

    08b1f8aec0de311805bb1f6321333c40

  • SHA1

    579949260d73ea7d118196408dcff51dc07d4098

  • SHA256

    9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261

  • SHA512

    113f71560d66b7e7922e8b6a9fa8ffb0ae6696daa6b4f5cf2939fdb957e5e660bde7675fe6fe85b0550419e264214221df6aa4e34d0d6603535c9356e81c3cc8

  • SSDEEP

    3072:UVqoCl/YgjxEufVU0TbTyDDalRmQ9yLrPgY34gv6nQt:UsLqdufVUNDayQ9WPgM6k

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe
    "C:\Users\Admin\AppData\Local\Temp\9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2516
    • \??\c:\users\admin\appdata\local\temp\9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261n.exe 
      c:\users\admin\appdata\local\temp\9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261n.exe 
      2⤵
      • Executes dropped EXE
      PID:2128
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3044
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4024
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4420
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5060
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261n.exe 

    Filesize

    43KB

    MD5

    a16f041c87529221c86e16124c7e9add

    SHA1

    e4933d7fc395b397db9aba78b05a2a490622c7e5

    SHA256

    df2abf387893332f28c4df68b10a6b176dc9706142055dccccf447f5a9cede2d

    SHA512

    972eb4a6cf96692ae0ad43b42a6d418406aad5539451b4e24e564b89a347a9fc8ee5572d9b876d9de7b72192ba70aa114e8de9d721b37af9c169503aaef611e9

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    7050f5493ec87d0a9e4e843865958c19

    SHA1

    02c422c29d6e5515d81727b1adbe596217dd742c

    SHA256

    e6402f03bcd6e3add17a78dc5319b610c651e9fef3a1076fc4098b6e38169eb2

    SHA512

    0005df93a80a42003a979a8fa502ddf9c08b36cfdb67e93d8e4bd6825eda491665e4476d09014cef875b85cc3594839b36b25266622679b78b24d62fc13a5277

  • C:\Windows\Resources\Themes\icsys.icn.exe

    Filesize

    135KB

    MD5

    dd4418238c7fdea254aed3eacd0f31bc

    SHA1

    16c82702ac7f9ec097946076e9da75b747e7b1bf

    SHA256

    a3fcf1bdb032cc813314bd389bd7562f32c45d80160f4f28e544f33a1a0e24ad

    SHA512

    aefbb89b8d06bd61722a6916d94e57be3e20dc9aead32519428755d895524ef198e51ae19d9c63b54f04b67f87043dc00d7371619658b389d4b27af347af9cae

  • C:\Windows\Resources\spoolsv.exe

    Filesize

    135KB

    MD5

    18441d51b4766ed6d33bd152cc7d0a91

    SHA1

    b81cfd64b9a4adf2825e5fca7f55a8021fa28cf8

    SHA256

    46a54a8b0fa444d9975eb8b1cb193903e10cfb465417895dca7834b4710bedd2

    SHA512

    69f5d22cb2fa6bae5fa45da2fd12f7ca6d990c154d30e5dbe4b5d3de5c20ada9cae33418c4d9447cb826af6a4c2c59256042ccaf9bef3656fff885f668e4c965

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    dbd115e8b9742686eb87885dbc818611

    SHA1

    abb3e786f4cca4aa2a38a0890a6d63873c959dbc

    SHA256

    95e20966b4267b81a92a573d199e2a8d47c1d44e48dd9ffc51cce2c956d6dee0

    SHA512

    35c4a7ab53fce452553687ea49110671456898daaa6467cad934ae277077939da2d8f85855826f443dcce1b973b6e724d8c7ec1339a8ae0d9fa7823108560024

  • memory/2516-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2516-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3044-45-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4024-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4420-44-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4924-43-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/5060-48-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB