Analysis
-
max time kernel
120s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 13:03
Static task
static1
Behavioral task
behavioral1
Sample
9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe
Resource
win10v2004-20240910-en
General
-
Target
9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe
-
Size
178KB
-
MD5
08b1f8aec0de311805bb1f6321333c40
-
SHA1
579949260d73ea7d118196408dcff51dc07d4098
-
SHA256
9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261
-
SHA512
113f71560d66b7e7922e8b6a9fa8ffb0ae6696daa6b4f5cf2939fdb957e5e660bde7675fe6fe85b0550419e264214221df6aa4e34d0d6603535c9356e81c3cc8
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalRmQ9yLrPgY34gv6nQt:UsLqdufVUNDayQ9WPgM6k
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 6 IoCs
pid Process 2128 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261n.exe 3044 icsys.icn.exe 4024 explorer.exe 4420 spoolsv.exe 5060 svchost.exe 4924 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 3044 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4024 explorer.exe 5060 svchost.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 3044 icsys.icn.exe 3044 icsys.icn.exe 4024 explorer.exe 4024 explorer.exe 4420 spoolsv.exe 4420 spoolsv.exe 5060 svchost.exe 5060 svchost.exe 4924 spoolsv.exe 4924 spoolsv.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2128 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 84 PID 2516 wrote to memory of 2128 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 84 PID 2516 wrote to memory of 3044 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 86 PID 2516 wrote to memory of 3044 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 86 PID 2516 wrote to memory of 3044 2516 9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe 86 PID 3044 wrote to memory of 4024 3044 icsys.icn.exe 87 PID 3044 wrote to memory of 4024 3044 icsys.icn.exe 87 PID 3044 wrote to memory of 4024 3044 icsys.icn.exe 87 PID 4024 wrote to memory of 4420 4024 explorer.exe 88 PID 4024 wrote to memory of 4420 4024 explorer.exe 88 PID 4024 wrote to memory of 4420 4024 explorer.exe 88 PID 4420 wrote to memory of 5060 4420 spoolsv.exe 89 PID 4420 wrote to memory of 5060 4420 spoolsv.exe 89 PID 4420 wrote to memory of 5060 4420 spoolsv.exe 89 PID 5060 wrote to memory of 4924 5060 svchost.exe 91 PID 5060 wrote to memory of 4924 5060 svchost.exe 91 PID 5060 wrote to memory of 4924 5060 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe"C:\Users\Admin\AppData\Local\Temp\9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\users\admin\appdata\local\temp\9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261n.exec:\users\admin\appdata\local\temp\9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261n.exe2⤵
- Executes dropped EXE
PID:2128
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4024 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4420 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9d4f692b7e9b9655e1900d52f9477b5a71e29520be390b4eeede575f046af261n.exe
Filesize43KB
MD5a16f041c87529221c86e16124c7e9add
SHA1e4933d7fc395b397db9aba78b05a2a490622c7e5
SHA256df2abf387893332f28c4df68b10a6b176dc9706142055dccccf447f5a9cede2d
SHA512972eb4a6cf96692ae0ad43b42a6d418406aad5539451b4e24e564b89a347a9fc8ee5572d9b876d9de7b72192ba70aa114e8de9d721b37af9c169503aaef611e9
-
Filesize
135KB
MD57050f5493ec87d0a9e4e843865958c19
SHA102c422c29d6e5515d81727b1adbe596217dd742c
SHA256e6402f03bcd6e3add17a78dc5319b610c651e9fef3a1076fc4098b6e38169eb2
SHA5120005df93a80a42003a979a8fa502ddf9c08b36cfdb67e93d8e4bd6825eda491665e4476d09014cef875b85cc3594839b36b25266622679b78b24d62fc13a5277
-
Filesize
135KB
MD5dd4418238c7fdea254aed3eacd0f31bc
SHA116c82702ac7f9ec097946076e9da75b747e7b1bf
SHA256a3fcf1bdb032cc813314bd389bd7562f32c45d80160f4f28e544f33a1a0e24ad
SHA512aefbb89b8d06bd61722a6916d94e57be3e20dc9aead32519428755d895524ef198e51ae19d9c63b54f04b67f87043dc00d7371619658b389d4b27af347af9cae
-
Filesize
135KB
MD518441d51b4766ed6d33bd152cc7d0a91
SHA1b81cfd64b9a4adf2825e5fca7f55a8021fa28cf8
SHA25646a54a8b0fa444d9975eb8b1cb193903e10cfb465417895dca7834b4710bedd2
SHA51269f5d22cb2fa6bae5fa45da2fd12f7ca6d990c154d30e5dbe4b5d3de5c20ada9cae33418c4d9447cb826af6a4c2c59256042ccaf9bef3656fff885f668e4c965
-
Filesize
135KB
MD5dbd115e8b9742686eb87885dbc818611
SHA1abb3e786f4cca4aa2a38a0890a6d63873c959dbc
SHA25695e20966b4267b81a92a573d199e2a8d47c1d44e48dd9ffc51cce2c956d6dee0
SHA51235c4a7ab53fce452553687ea49110671456898daaa6467cad934ae277077939da2d8f85855826f443dcce1b973b6e724d8c7ec1339a8ae0d9fa7823108560024