Analysis
-
max time kernel
42s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
Install_New_theme.bat
Resource
win7-20240903-en
General
-
Target
Install_New_theme.bat
-
Size
600B
-
MD5
99638e3caf39bd8aac3010f291727fcd
-
SHA1
f688f9f969ffaf78c62f17f8a8df44490b952514
-
SHA256
a461119f4dcaca45b8438792b6daba9a83d520f47127ebb7a7ed6d68c0ac1008
-
SHA512
638bdc5e83558daf1c3d14e1ef3669d578ce3bc0df7c4643441e00d1d334397d409bb1329f07d559f0b7de21cfee406abfde24f7bc4d3129f2cf52e53612e84f
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 1964 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1200 SpotifySetup.exe 3180 Spotify.exe -
Loads dropped DLL 2 IoCs
pid Process 3180 Spotify.exe 3180 Spotify.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 raw.githubusercontent.com 1 raw.githubusercontent.com -
pid Process 1964 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SpotifySetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Spotify.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe 1964 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 1964 powershell.exe Token: SeIncreaseQuotaPrivilege 1964 powershell.exe Token: SeSecurityPrivilege 1964 powershell.exe Token: SeTakeOwnershipPrivilege 1964 powershell.exe Token: SeLoadDriverPrivilege 1964 powershell.exe Token: SeSystemProfilePrivilege 1964 powershell.exe Token: SeSystemtimePrivilege 1964 powershell.exe Token: SeProfSingleProcessPrivilege 1964 powershell.exe Token: SeIncBasePriorityPrivilege 1964 powershell.exe Token: SeCreatePagefilePrivilege 1964 powershell.exe Token: SeBackupPrivilege 1964 powershell.exe Token: SeRestorePrivilege 1964 powershell.exe Token: SeShutdownPrivilege 1964 powershell.exe Token: SeDebugPrivilege 1964 powershell.exe Token: SeSystemEnvironmentPrivilege 1964 powershell.exe Token: SeRemoteShutdownPrivilege 1964 powershell.exe Token: SeUndockPrivilege 1964 powershell.exe Token: SeManageVolumePrivilege 1964 powershell.exe Token: 33 1964 powershell.exe Token: 34 1964 powershell.exe Token: 35 1964 powershell.exe Token: 36 1964 powershell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4540 wrote to memory of 1964 4540 cmd.exe 85 PID 4540 wrote to memory of 1964 4540 cmd.exe 85 PID 1964 wrote to memory of 4512 1964 powershell.exe 89 PID 1964 wrote to memory of 4512 1964 powershell.exe 89 PID 1964 wrote to memory of 348 1964 powershell.exe 90 PID 1964 wrote to memory of 348 1964 powershell.exe 90 PID 1964 wrote to memory of 1212 1964 powershell.exe 91 PID 1964 wrote to memory of 1212 1964 powershell.exe 91 PID 1964 wrote to memory of 4768 1964 powershell.exe 92 PID 1964 wrote to memory of 4768 1964 powershell.exe 92 PID 4444 wrote to memory of 1200 4444 explorer.exe 94 PID 4444 wrote to memory of 1200 4444 explorer.exe 94 PID 4444 wrote to memory of 1200 4444 explorer.exe 94 PID 1200 wrote to memory of 3180 1200 SpotifySetup.exe 97 PID 1200 wrote to memory of 3180 1200 SpotifySetup.exe 97 PID 1200 wrote to memory of 3180 1200 SpotifySetup.exe 97
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Install_New_theme.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -Command [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12; $p='-new_theme'; """ & { $(try { iwr -useb 'https://raw.githubusercontent.com/SpotX-Official/spotx-official.github.io/main/run.ps1' } catch { $p+= ' -m'; iwr -useb 'https://spotx-official.github.io/run.ps1' })} $p """" | iex2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\curl.exe"C:\Windows\system32\curl.exe" -V3⤵PID:4512
-
-
C:\Windows\system32\curl.exe"C:\Windows\system32\curl.exe" -Is -w "%{http_code} \n" -o /dev/null -k https://download.scdn.co/upgrade/client/win32-x86/spotify_installer-1.2.48.405.gf2c48e6f-2008.exe --retry 2 --ssl-no-revoke3⤵PID:348
-
-
C:\Windows\system32\curl.exe"C:\Windows\system32\curl.exe" -q -k https://download.scdn.co/upgrade/client/win32-x86/spotify_installer-1.2.48.405.gf2c48e6f-2008.exe -o C:\Users\Admin\AppData\Local\Temp\SpotX_Temp-2024-10-12_17-49-00\SpotifySetup.exe --progress-bar --retry 3 --ssl-no-revoke3⤵PID:1212
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe" C:\Users\Admin\AppData\Local\Temp\SpotX_Temp-2024-10-12_17-49-00\SpotifySetup.exe3⤵PID:4768
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\SpotX_Temp-2024-10-12_17-49-00\SpotifySetup.exe"C:\Users\Admin\AppData\Local\Temp\SpotX_Temp-2024-10-12_17-49-00\SpotifySetup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Roaming\Spotify\Spotify.exeSpotify.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
26.6MB
MD5fe1def21770cd83425dbab7fcca56ffe
SHA10dcb1e017449599d313e196a76ef533d8545fb5f
SHA25672153921a5ba44466c5b05ce87b55dd6355a784fb1d037a79493a62892fd3ef7
SHA512fa7fbcb606ed931440ce8c68ebedea1e7c8c0389ef845a7fa03992e485f548915972f8a46c8f7720433477f7de4360deb467ce613f2760115e748693f752a57c
-
Filesize
1.0MB
MD50c30ec2cab53f9a55055fa34d4884bd9
SHA14d29c1ebd563abf5aadb54e9322a746cdd14a864
SHA256efadc39759861edfea81980190cd0e2d2c4e7159e79b092936776efba1298f8e
SHA51203ff6348ff4448526926d4825604c395181f4114f2d5ca2fba258aa7ae8a57374e6cfbc693faf2653f9a79ee022f161a9e1ab4e682e6fefdab6e05dc8f7080f3