Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe
Resource
win10v2004-20241007-en
General
-
Target
4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe
-
Size
135KB
-
MD5
5b1d03fe0e6202f8fbf18e6a7457d4ae
-
SHA1
d71b35f854f5b3dffaa87a97caf5f9fd9c28be25
-
SHA256
4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870
-
SHA512
7cdddb4a6d326d0d5bfcf3d014bf5d367be6208065f951e8e37e4392e41ce13d09f069e32b24caa9e9684f3f0d4d54c5d9cee5b585c77e919a0a7b54be809582
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVLXH/:UVqoCl/YgjxEufVU0TbTyDDal9XH/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 3060 explorer.exe 2500 spoolsv.exe 2456 svchost.exe 2860 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 3060 explorer.exe 2500 spoolsv.exe 2456 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe 2968 schtasks.exe 1312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 2456 svchost.exe 3060 explorer.exe 2456 svchost.exe 2456 svchost.exe 3060 explorer.exe 3060 explorer.exe 3060 explorer.exe 2456 svchost.exe 2456 svchost.exe 3060 explorer.exe 3060 explorer.exe 2456 svchost.exe 2456 svchost.exe 3060 explorer.exe 3060 explorer.exe 2456 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3060 explorer.exe 2456 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 3060 explorer.exe 3060 explorer.exe 2500 spoolsv.exe 2500 spoolsv.exe 2456 svchost.exe 2456 svchost.exe 2860 spoolsv.exe 2860 spoolsv.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1728 wrote to memory of 3060 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 30 PID 1728 wrote to memory of 3060 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 30 PID 1728 wrote to memory of 3060 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 30 PID 1728 wrote to memory of 3060 1728 4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe 30 PID 3060 wrote to memory of 2500 3060 explorer.exe 31 PID 3060 wrote to memory of 2500 3060 explorer.exe 31 PID 3060 wrote to memory of 2500 3060 explorer.exe 31 PID 3060 wrote to memory of 2500 3060 explorer.exe 31 PID 2500 wrote to memory of 2456 2500 spoolsv.exe 32 PID 2500 wrote to memory of 2456 2500 spoolsv.exe 32 PID 2500 wrote to memory of 2456 2500 spoolsv.exe 32 PID 2500 wrote to memory of 2456 2500 spoolsv.exe 32 PID 2456 wrote to memory of 2860 2456 svchost.exe 33 PID 2456 wrote to memory of 2860 2456 svchost.exe 33 PID 2456 wrote to memory of 2860 2456 svchost.exe 33 PID 2456 wrote to memory of 2860 2456 svchost.exe 33 PID 3060 wrote to memory of 2776 3060 explorer.exe 34 PID 3060 wrote to memory of 2776 3060 explorer.exe 34 PID 3060 wrote to memory of 2776 3060 explorer.exe 34 PID 3060 wrote to memory of 2776 3060 explorer.exe 34 PID 2456 wrote to memory of 2824 2456 svchost.exe 35 PID 2456 wrote to memory of 2824 2456 svchost.exe 35 PID 2456 wrote to memory of 2824 2456 svchost.exe 35 PID 2456 wrote to memory of 2824 2456 svchost.exe 35 PID 2456 wrote to memory of 2968 2456 svchost.exe 39 PID 2456 wrote to memory of 2968 2456 svchost.exe 39 PID 2456 wrote to memory of 2968 2456 svchost.exe 39 PID 2456 wrote to memory of 2968 2456 svchost.exe 39 PID 2456 wrote to memory of 1312 2456 svchost.exe 41 PID 2456 wrote to memory of 1312 2456 svchost.exe 41 PID 2456 wrote to memory of 1312 2456 svchost.exe 41 PID 2456 wrote to memory of 1312 2456 svchost.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe"C:\Users\Admin\AppData\Local\Temp\4687c842f485a6eef9a77c7327ccb21aaad63c1048d1406518e3d9aab06a9870.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:22 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2824
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:23 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 21:24 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1312
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD504a74b722688f3bd7d67bbc692e66757
SHA1507bd1dd93f98e61d13b79307ba9c5954e5dbb88
SHA25651d244523009a794649077ed358e125b81e6655ec3cc67173ceec9fb28643b63
SHA512da8259aca7f1938c4746ae6b1591bf4bd5011f88e09e103fc48a11a247355a8da30be9c203a12dbb37925cab0e1caf203f8d536da92da8da4b3ff3f82846c4da
-
Filesize
135KB
MD537753c985132d01c68671702cfc68bd9
SHA1e95ef7ce9f47151bac11db269317f767eb555e0e
SHA2560e3305742636558e15b8d2e6f9f375daecb99b20a50f0a7ff9d2d71b5e560980
SHA5123d8b6e217088ebde69d92145357d8daded9260711c3814593667d77fa037439ca7825678e73562ce4d854c9a06ee4fb8bf6659ddf602092cc9f0138e0cc6ad82
-
Filesize
135KB
MD529144a5eeeed234227093d7f4ce3826d
SHA1f7f6b0abf0c0f59d69dad0cd8630bcb90c416a4d
SHA256bd56071ed4533adddd75cea97ff1edca5719e26bcd04b4e06431968f0b5592c9
SHA512cced0d4c38518f7b4a7674608569a8c2b87f28dae4b8fd4dd8fd89254848c4f4473afac310374ece91f263987e7aa1f175d7f416c606d3758d2d0ab174fcaac2