Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe
Resource
win10v2004-20241007-en
General
-
Target
5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe
-
Size
135KB
-
MD5
17b0b82c62c97a1615bff55c490a19ed
-
SHA1
247800f9ef5d5a3b884cf1f16166ab337657073c
-
SHA256
5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c
-
SHA512
992f5bdd97681f21804e908bec40a0c7a5c34a69a0eef4d3cbf88c041aaf5222258c247a4ac3fc9aed2ec7ad1728a290f8689609badeab68d57584d3d3edc9dc
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVwdz88888888888x:UVqoCl/YgjxEufVU0TbTyDDalWd+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 1936 explorer.exe 212 spoolsv.exe 3844 svchost.exe 3932 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe 1936 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1936 explorer.exe 3844 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 1936 explorer.exe 1936 explorer.exe 212 spoolsv.exe 212 spoolsv.exe 3844 svchost.exe 3844 svchost.exe 3932 spoolsv.exe 3932 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1936 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 83 PID 2052 wrote to memory of 1936 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 83 PID 2052 wrote to memory of 1936 2052 5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe 83 PID 1936 wrote to memory of 212 1936 explorer.exe 84 PID 1936 wrote to memory of 212 1936 explorer.exe 84 PID 1936 wrote to memory of 212 1936 explorer.exe 84 PID 212 wrote to memory of 3844 212 spoolsv.exe 85 PID 212 wrote to memory of 3844 212 spoolsv.exe 85 PID 212 wrote to memory of 3844 212 spoolsv.exe 85 PID 3844 wrote to memory of 3932 3844 svchost.exe 86 PID 3844 wrote to memory of 3932 3844 svchost.exe 86 PID 3844 wrote to memory of 3932 3844 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe"C:\Users\Admin\AppData\Local\Temp\5ec15f5f6fe64d7dcdaf5ac5efa5c34d4ec565485b41e3e6db6b2979b5ed642c.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3844 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3932
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5a72756391a4c94310fb86dc8f554e251
SHA1c9ca538cdd677c78bde512d92587fc6a56dcbd8e
SHA2565b92147ddb9de5b0c8d3257be4a93f169bb5940646477dd1d74ddd4370d83998
SHA5128f264ae165a4f9cac86b5f1ad96b181779075d2e2fa3efb16fe14729b92d51afe0bca95a065dee3eabc48a71bdb3d43c47367b64f88e3cef1093880dea1c823a
-
Filesize
135KB
MD58f62bf0fafab4ae328c6457fc11b8213
SHA1684226b01feb361ee487b4593ce0844ea8e2ef2b
SHA2563e73a9a34c2007fe28012e2b635f363d07be93f0724a610c1da04402f69014f1
SHA51258542751b02ae95cf6c624e5eec8934051ff2f2b67090d9c4322a14056a893c0531b5662c7a640e56dda97283bb6b21394eb140539cb97629870d93e0f9288e8
-
Filesize
135KB
MD561217499a7670b53fa2d298875792ed9
SHA145671529f05d3551a47e2fdfa289d7ba48bda345
SHA25685a6e2529587c71902d67fade679a308176aa2c0fefd1389bb4d3400d0af453f
SHA5128db72039352cd57cc611360a40d2b5b91c258b90b0754bcbbf96cf2871b0e5fc8abf67a63d372ecd9bb6ed516bba0cd3cec26ae69edc16c0657405fb0b290a50