Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe
Resource
win10v2004-20241007-en
General
-
Target
05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe
-
Size
135KB
-
MD5
02e9f40c77e422cdff78cb98a8b735cb
-
SHA1
22a41eb7197008b50bb69c2a73c9693451000785
-
SHA256
05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530
-
SHA512
6343077a58963b653ff305408842cdf4adbf771f050b75b2e3a0521408f51b51bc9613f5927a60a69e3a89cb5c1f9e900caa93194fe6a9e99f38b31c2b489b22
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVPm:UVqoCl/YgjxEufVU0TbTyDDalFm
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4140 explorer.exe 1708 spoolsv.exe 1452 svchost.exe 3540 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe 4140 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4140 explorer.exe 1452 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 4140 explorer.exe 4140 explorer.exe 1708 spoolsv.exe 1708 spoolsv.exe 1452 svchost.exe 1452 svchost.exe 3540 spoolsv.exe 3540 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3248 wrote to memory of 4140 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 85 PID 3248 wrote to memory of 4140 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 85 PID 3248 wrote to memory of 4140 3248 05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe 85 PID 4140 wrote to memory of 1708 4140 explorer.exe 86 PID 4140 wrote to memory of 1708 4140 explorer.exe 86 PID 4140 wrote to memory of 1708 4140 explorer.exe 86 PID 1708 wrote to memory of 1452 1708 spoolsv.exe 88 PID 1708 wrote to memory of 1452 1708 spoolsv.exe 88 PID 1708 wrote to memory of 1452 1708 spoolsv.exe 88 PID 1452 wrote to memory of 3540 1452 svchost.exe 89 PID 1452 wrote to memory of 3540 1452 svchost.exe 89 PID 1452 wrote to memory of 3540 1452 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe"C:\Users\Admin\AppData\Local\Temp\05a7b5f40168be8e844a8dc1c0dcc5d50cd18dbe155663a8390957103db94530.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3248 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4140 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3540
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5227220e259824cb68917e27b38d27e2d
SHA14c0e1607d53bf49ac2c7b89bda3658c49decd5dd
SHA256a68cc4b87e512ec7aa56b3aab8d10a3b173c738f94ea5757282c89b47e937c73
SHA5120440a677d525224cbadac6701a5b55c78862dff3a8ddc0a968b3c4b7f7aab62090b5cfbfcd14f09cfbbdea95573880e4b554a054ab85402d32ac5d2aaacbe74e
-
Filesize
135KB
MD5d9551f03cf7f6d93abcf6ee3bcfe7df3
SHA1934a395fb15389b717eae1092714dace356504c6
SHA256bcebf14884fadf27ecc38ea411c65086c5777596befa5ca50c722f759862fb56
SHA512f3ed48e8ce19cdb81a6158af115d2713eb78323be1f479e9103e8a309df2fda99aece8de8cee760d6be571d07f9981cef77838ea8c59dc5e2c83aaef4ae4bec3
-
Filesize
135KB
MD5c106f9a7fdaf2e9117f601b24156409d
SHA18be23dd5d91d7e2a50d04604e725ba9b7f1c936b
SHA2568003a916fdc7ecec7a974986f9383776f6630371a6038e2a8723cc4dba7c336d
SHA512ed58359832f59ea1b4787ca44cf08e1b84742e3b6dd0a893ca96d8282d31a6b2aeacdfb4476b3dbccad75bdf44c83e6df5f593e39171437c4e35cab041d75d2e