Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe
Resource
win10v2004-20241007-en
General
-
Target
debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe
-
Size
215KB
-
MD5
9df07e88bc889cf23713548c5b49cad0
-
SHA1
3bf488f72e9282b5183dec10249ad29749917984
-
SHA256
debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77
-
SHA512
49ffdf26ae0711f1a1f56aefa55a223b198cc46a60a14ecf01d80da18aa12b8dc4ee15a3dad64c4577bf4c3f088d3f6bf2d55ed2d3ba450906275c367af2aea3
-
SSDEEP
1536:JfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbJddu5QWXDp:JVqoCl/YgjxEufVU0TbTyDDalbduWWX1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 5108 explorer.exe 4952 spoolsv.exe 676 svchost.exe 2712 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\themes\explorer.exe debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe 5108 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5108 explorer.exe 676 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 5108 explorer.exe 5108 explorer.exe 4952 spoolsv.exe 4952 spoolsv.exe 676 svchost.exe 676 svchost.exe 2712 spoolsv.exe 2712 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5084 wrote to memory of 5108 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 83 PID 5084 wrote to memory of 5108 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 83 PID 5084 wrote to memory of 5108 5084 debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe 83 PID 5108 wrote to memory of 4952 5108 explorer.exe 84 PID 5108 wrote to memory of 4952 5108 explorer.exe 84 PID 5108 wrote to memory of 4952 5108 explorer.exe 84 PID 4952 wrote to memory of 676 4952 spoolsv.exe 86 PID 4952 wrote to memory of 676 4952 spoolsv.exe 86 PID 4952 wrote to memory of 676 4952 spoolsv.exe 86 PID 676 wrote to memory of 2712 676 svchost.exe 87 PID 676 wrote to memory of 2712 676 svchost.exe 87 PID 676 wrote to memory of 2712 676 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe"C:\Users\Admin\AppData\Local\Temp\debb15d92cc5eed64e48cbd40e276cc32ce2cb64b82dec24ccd6efb0a3177e77N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5108 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD5ae98493f39bf80705fcb452a65431e0c
SHA109cec6b0f95599712c0b79c40909fff5f7158434
SHA256f54cca4a4f59a9d8c41dd7e2fa874985168dd02472764b45209fce67f5c5275d
SHA5127f38e250435adc4b08429e57a0879a23a3038c035052defb96b3fc77fe0c9e7e1c6e9ee380819e1b8a7d14c7574a3d18b16aea229595ba2752922810479a458f
-
Filesize
215KB
MD5a1d4ca2d32aefb8d6811b8dbbaa06900
SHA1981a09126f10fecd697e2b7153995879beaab763
SHA256adc4219f6ece3f39346c1298164c1eab557dfe40cf8d4c164013fbc7dea18682
SHA5127e7d50bb77b9b8ae4dc89b5081e2af610568f2799165d6aae72903a63730bbd6319eb0daa7bdd1806f27d1247b8e3f4485c56a914030717eabeb7f2f82080e7b
-
Filesize
215KB
MD50ab22c30a2225bdb8e77575cdda656eb
SHA1b4055fac263029efe1e84c37fe62544f64edff2a
SHA256004f51f037e2130d2381ee31c2f95d5f6bb5e435c6e0cc746ee2406e7617d703
SHA512b18bbc1bc845161cd9389b2ac420d3399ddc4456ad54f436e9d4bd9503f5a30600f91554da9f679d6b8025a231dad9ac232316042023b299290fcf2c98213ab7