Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 18:23

General

  • Target

    c6f0de1f19297d125dbcf7968826747c0ed6e0220a564309e79d2843282b32d5.exe

  • Size

    87KB

  • MD5

    fdd771260012bb7d852d90d8dcd20f19

  • SHA1

    6c312d5669847e7afeb1983337c58e3fd15dcb2a

  • SHA256

    c6f0de1f19297d125dbcf7968826747c0ed6e0220a564309e79d2843282b32d5

  • SHA512

    8a630e37499b56a9a6fc6492dba020b586faaf1e7d4d83d3309b88631175ceddc9296ed3cbefea7aa4e66e553112640ae142216b30ee86c8f65e423b3321995f

  • SSDEEP

    1536:1a3+ddygX7y9v7Z+NoykJHBOAFRfBjG3ldoI3:08dfX7y9DZ+N7eB+II3

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 8 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 29 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 33 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6f0de1f19297d125dbcf7968826747c0ed6e0220a564309e79d2843282b32d5.exe
    "C:\Users\Admin\AppData\Local\Temp\c6f0de1f19297d125dbcf7968826747c0ed6e0220a564309e79d2843282b32d5.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\recycled\SVCHOST.EXE
      C:\recycled\SVCHOST.EXE :agent
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\recycled\SVCHOST.EXE
        C:\recycled\SVCHOST.EXE :agent
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:804
      • F:\recycled\SVCHOST.EXE
        F:\recycled\SVCHOST.EXE :agent
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\recycled\SVCHOST.EXE
          C:\recycled\SVCHOST.EXE :agent
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3648
        • F:\recycled\SVCHOST.EXE
          F:\recycled\SVCHOST.EXE :agent
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:5068
        • C:\recycled\SPOOLSV.EXE
          C:\recycled\SPOOLSV.EXE :agent
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3044
          • C:\recycled\SVCHOST.EXE
            C:\recycled\SVCHOST.EXE :agent
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2240
          • F:\recycled\SVCHOST.EXE
            F:\recycled\SVCHOST.EXE :agent
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2508
          • C:\recycled\SPOOLSV.EXE
            C:\recycled\SPOOLSV.EXE :agent
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:396
      • C:\recycled\SPOOLSV.EXE
        C:\recycled\SPOOLSV.EXE :agent
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5028
    • F:\recycled\SVCHOST.EXE
      F:\recycled\SVCHOST.EXE :agent
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1000
    • C:\recycled\SPOOLSV.EXE
      C:\recycled\SPOOLSV.EXE :agent
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3728
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c6f0de1f19297d125dbcf7968826747c0ed6e0220a564309e79d2843282b32d5.doc" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recycled\SPOOLSV.EXE

    Filesize

    87KB

    MD5

    8617d6e779cf8deb5a08d79eec05d6a5

    SHA1

    458b490db65bcda3cff1120bc12dd1ccbc1b3fed

    SHA256

    33f0ecbbd5dabf79865a2354fc22bef26c8bc9e1d3d4d36feec8b39a9b169ee3

    SHA512

    75800cc9a3a408d9c06533bde413a7a7e6952de74911fd7bd7bcac0ae4e823e01aba61d069508bd22c041981ad5a06dadec842ad9d3a16a49df8ea3ddafadb7c

  • C:\Recycled\SVCHOST.EXE

    Filesize

    87KB

    MD5

    221b19ab9b3b5cb4b1f70b070006710a

    SHA1

    7b8471569b7a0b44edb560c152cb09fdf01ad7bc

    SHA256

    ec438467717927e996dbb6a6f29f592e7d170e74201f89e1cc7a555145c6c51a

    SHA512

    25cfcd853070bc54199bd3e127d8be50ec627fac4428cb0939a9f5d15da28293d33733cbcc0a3589c5edc3938ca6546a8d4e958a15598d703fce0e9b6920f349

  • C:\Users\Admin\AppData\Local\Temp\Flu Burung.txt

    Filesize

    2KB

    MD5

    1a1dce35d60d2c70ca8894954fd5d384

    SHA1

    58547dd65d506c892290755010d0232da34ee000

    SHA256

    2661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c

    SHA512

    4abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e

  • C:\Users\Admin\AppData\Local\Temp\c6f0de1f19297d125dbcf7968826747c0ed6e0220a564309e79d2843282b32d5.doc

    Filesize

    35B

    MD5

    09e4a6ba7a65496e2774c8a222722040

    SHA1

    7bf0ac65557efa06dc202e7a1b5dee90c1aa92d0

    SHA256

    aa13928c84299cdbf9cb5440e290ffce9744496998a21b9b67ff4e5f887d9d9f

    SHA512

    8511791174aef257920deed01dcbdee1cc7513c4d75c3ff5c7798672f754927d49c59def7c00c62a1b05b35226a1d2e0b433e8fe1843564765845a02f4cd7eab

  • C:\Windows\Fonts\ Explorer.exe

    Filesize

    87KB

    MD5

    441dfee06ffe441f5da2b923c25c73be

    SHA1

    921a86e67093f3201e588bc36d9f4af9bdf61a8d

    SHA256

    9f5ec78a2378d87de51881c7cbecabffe121c068fa4ae6bb412b673898fab689

    SHA512

    7d1cb5110f3f8380d7c9815a6db5ce619758826a48da6a76c7d2c2a13c7213f46140af66369608f39c930a01002129c0ac1a07ef8428e56e92800d3577dafa91

  • C:\Windows\Fonts\ Explorer.exe

    Filesize

    87KB

    MD5

    591f3a5394993961e8c81fc2468e378c

    SHA1

    b47ee0cd3fc5ee5d36f6dd099ca3ebda34cabda3

    SHA256

    0bfd4a305f473f74f378551870cf0e05729e3794ff7a55711813bee241d2da54

    SHA512

    60cc5246f6d934ad58ec79680932948b2f267ac55d78597207cba8006c48c4e634affa8cfdde86fe558c69a8cd7dedc764dcc506d5d547eb6ac6cff4a5a1ba85

  • C:\Windows\Fonts\ Explorer.exe

    Filesize

    87KB

    MD5

    8ec543744e5208585316ad0eccd04235

    SHA1

    23ee596652ce578e7562595d20ff6cbbda8f146e

    SHA256

    16ce98003bc7a9d7cc90fa4d1e6849b5c51bfaa46302da1439763df4a69913cb

    SHA512

    caec81e91460d9a16c097dee6d46413809e0817525a01591dbcb0f1ca1c3051815f904a8d28e2fdd11908a2275e7c8e3000d24bc37b49c1164a5cd0f1a73160c

  • C:\begolu.txt

    Filesize

    2B

    MD5

    2b9d4fa85c8e82132bde46b143040142

    SHA1

    a02431cf7c501a5b368c91e41283419d8fa9fb03

    SHA256

    4658d6abbbaf7748c172ed5a3e003cdb8997648f88724834e41f75e54520e142

    SHA512

    c37f27b442d578e94db6e5d879d026b0b3457f42b99ec56a9cb6fca3161540a32e207b942ef2ddb7be01fa9245ba4d8c859978a0f9a498c1ad8aa46d0890e6be

  • F:\Recycled\SVCHOST.EXE

    Filesize

    87KB

    MD5

    4c09608911059297fd0dde45ab0e98db

    SHA1

    3820ac436a78e911cc87ed170a234eac7335584a

    SHA256

    bdfdf625144efeaf66b92414c680f4d4da08558c1bff94e56b84299f44aefb74

    SHA512

    3a9a9405cb34bb4fae881fed45bdeb07f162ea8bd2ba4d66b3a03a310171212d407a502dc2fe5f80479b459f8a2cce1ac2a7056cdebfaf66cf22c12e9f13f8bb

  • memory/396-69-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/804-31-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1000-77-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1000-81-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1520-109-0x00007FFD6D3D0000-0x00007FFD6D3E0000-memory.dmp

    Filesize

    64KB

  • memory/1520-107-0x00007FFD6D3D0000-0x00007FFD6D3E0000-memory.dmp

    Filesize

    64KB

  • memory/1520-112-0x00007FFD6AB80000-0x00007FFD6AB90000-memory.dmp

    Filesize

    64KB

  • memory/1520-113-0x00007FFD6AB80000-0x00007FFD6AB90000-memory.dmp

    Filesize

    64KB

  • memory/1520-111-0x00007FFD6D3D0000-0x00007FFD6D3E0000-memory.dmp

    Filesize

    64KB

  • memory/1520-108-0x00007FFD6D3D0000-0x00007FFD6D3E0000-memory.dmp

    Filesize

    64KB

  • memory/1520-110-0x00007FFD6D3D0000-0x00007FFD6D3E0000-memory.dmp

    Filesize

    64KB

  • memory/1780-33-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1780-207-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2060-206-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2060-18-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2240-62-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2508-66-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3044-50-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3044-213-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3648-44-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3724-106-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3724-0-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3728-85-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/3728-83-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/5028-75-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/5028-73-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/5068-48-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB