Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe
Resource
win10v2004-20241007-en
General
-
Target
842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe
-
Size
1.4MB
-
MD5
767ff159e6df2d845054f670c848fa40
-
SHA1
e11f65b9e839c1151bc0cc05b63bd8f6dc016464
-
SHA256
842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5
-
SHA512
fb685dceab7ca725479677957590ffab0b4f1e415009831fdfb5ae4e211e5f776ee616f1531f7bae6a14f7d1f170afddcb0f79deccacf2de12f25ef87c7be729
-
SSDEEP
24576:+Cge4x02Y3FEdtiWCS/SwZry1onErH6yj/VpIxIS9FH3Y+q9ZY2mxKv:IW2ddtiWVqNYUVkNFXo7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2584 842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5n.exe 1456 icsys.icn.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\explorer.exe icsys.icn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5n.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe 1456 icsys.icn.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 440 842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe 440 842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe 1456 icsys.icn.exe 1456 icsys.icn.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 440 wrote to memory of 2584 440 842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe 83 PID 440 wrote to memory of 2584 440 842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe 83 PID 440 wrote to memory of 2584 440 842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe 83 PID 440 wrote to memory of 1456 440 842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe 84 PID 440 wrote to memory of 1456 440 842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe 84 PID 440 wrote to memory of 1456 440 842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe 84 PID 1456 wrote to memory of 772 1456 icsys.icn.exe 97 PID 1456 wrote to memory of 772 1456 icsys.icn.exe 97 PID 1456 wrote to memory of 772 1456 icsys.icn.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe"C:\Users\Admin\AppData\Local\Temp\842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
\??\c:\users\admin\appdata\local\temp\842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5n.exec:\users\admin\appdata\local\temp\842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5n.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Users\Admin\AppData\Roaming\icsys.icn.exeC:\Users\Admin\AppData\Roaming\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1456 -
\??\c:\windows\SysWOW64\explorer.exec:\windows\system32\explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\842a5441a24e8f4a30069f2c925df0855f4355240ca7fccb51c0cfaba0f169b5n.exe
Filesize1.2MB
MD536434a062f5ca2210aa8882098603610
SHA1ff4dc56c0f0b0657c17e0205b9aa2a1c036bd4d2
SHA256c705fa69f06a4a6c3af8067ca52040b2630ade7b1d59fe4a6ae5fa7f32382bee
SHA5125f41fd27f14b9ae6301306e220fadebe5bb27f0917a3c9d9b37376ed0b17651b366404e13e2e44ae0e8d81fca3db865a5cb3271ef9320c51ee309aeb04a06e8f
-
Filesize
206KB
MD59662fa1fc8c05aa785823d1642e37188
SHA1810b6565d594bbc95dc11488bb40837e4ea35e3a
SHA2563c532e17b0681eb19e4ad409a890c5b99891209a579b81f39b99e042250e87d3
SHA512adf5ed9c579d625adb0f6d11fc4a88bd1e9fd63ddb7bccecbd68c6033f790cd8165f8e5820ae571d39acbd6cfe3280ea05c0870bba4fba69cde1705a0370958b