Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe
Resource
win10v2004-20241007-en
General
-
Target
0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe
-
Size
135KB
-
MD5
3856a3ac3804e53533e3969214399e70
-
SHA1
0df88880988081ae64eef6467fa98c2c7cf5861d
-
SHA256
0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237
-
SHA512
d7a829ef6d320a15c208acf70cc32529478ca8681304fb0f50f98626dbfef4a9379b6c7fd4510f634e73335d2df13abb3c89022e33e60c832f54383ced4f50b2
-
SSDEEP
1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVSB:UVqoCl/YgjxEufVU0TbTyDDalgB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 652 explorer.exe 2872 spoolsv.exe 2332 svchost.exe 2924 spoolsv.exe -
Loads dropped DLL 4 IoCs
pid Process 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 652 explorer.exe 2872 spoolsv.exe 2332 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2780 schtasks.exe 2168 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 652 explorer.exe 652 explorer.exe 652 explorer.exe 2332 svchost.exe 2332 svchost.exe 652 explorer.exe 2332 svchost.exe 2332 svchost.exe 652 explorer.exe 652 explorer.exe 2332 svchost.exe 652 explorer.exe 2332 svchost.exe 652 explorer.exe 2332 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 652 explorer.exe 2332 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 652 explorer.exe 652 explorer.exe 2872 spoolsv.exe 2872 spoolsv.exe 2332 svchost.exe 2332 svchost.exe 2924 spoolsv.exe 2924 spoolsv.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3012 wrote to memory of 652 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 29 PID 3012 wrote to memory of 652 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 29 PID 3012 wrote to memory of 652 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 29 PID 3012 wrote to memory of 652 3012 0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe 29 PID 652 wrote to memory of 2872 652 explorer.exe 30 PID 652 wrote to memory of 2872 652 explorer.exe 30 PID 652 wrote to memory of 2872 652 explorer.exe 30 PID 652 wrote to memory of 2872 652 explorer.exe 30 PID 2872 wrote to memory of 2332 2872 spoolsv.exe 31 PID 2872 wrote to memory of 2332 2872 spoolsv.exe 31 PID 2872 wrote to memory of 2332 2872 spoolsv.exe 31 PID 2872 wrote to memory of 2332 2872 spoolsv.exe 31 PID 2332 wrote to memory of 2924 2332 svchost.exe 32 PID 2332 wrote to memory of 2924 2332 svchost.exe 32 PID 2332 wrote to memory of 2924 2332 svchost.exe 32 PID 2332 wrote to memory of 2924 2332 svchost.exe 32 PID 652 wrote to memory of 1084 652 explorer.exe 33 PID 652 wrote to memory of 1084 652 explorer.exe 33 PID 652 wrote to memory of 1084 652 explorer.exe 33 PID 652 wrote to memory of 1084 652 explorer.exe 33 PID 2332 wrote to memory of 2780 2332 svchost.exe 34 PID 2332 wrote to memory of 2780 2332 svchost.exe 34 PID 2332 wrote to memory of 2780 2332 svchost.exe 34 PID 2332 wrote to memory of 2780 2332 svchost.exe 34 PID 2332 wrote to memory of 2168 2332 svchost.exe 37 PID 2332 wrote to memory of 2168 2332 svchost.exe 37 PID 2332 wrote to memory of 2168 2332 svchost.exe 37 PID 2332 wrote to memory of 2168 2332 svchost.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe"C:\Users\Admin\AppData\Local\Temp\0fc9be39fbeb9a2673dfa3ad0dba31c46717a6d8289bbca08d34416152b8a237N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:652 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:06 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2780
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:07 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2168
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe3⤵PID:1084
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD542d8e563c4cfb684ec4fc26e64ccaa1e
SHA11728f85658cb241fd3ade0879bb442a47a3f592f
SHA2560f6b4b5a2aefc552ec28724d0370796422725987deae32be03378c68fa36aa6b
SHA512c9c51938c268f02ba1abb987870f2fe33f04756810bf8011c76c5d10072a008721777e72226f84559a676d07f837d00d55bddc1c61f59cf67d3b7ad8908ed6ba
-
Filesize
135KB
MD517374ceff400da34a0a5db7f0ada41b7
SHA129cb9264e20ccc219c61357986231c06971d4a86
SHA25697cef08ad86aea6797ec24b90394149eadefac843221ab6aa58058c55688cfbc
SHA512e16eff0ebab1b7fd177f8d09e152c21be12e05b9daa96ca39feefb7cbbb8be37ddccef66085baff189ae5d7c159df82cee0ba33c1cb6a6110022bb215414530c
-
Filesize
135KB
MD572440985ea6ea2c545bb1616f875ba8c
SHA116ffe9138d94c66d697d2c6dcb5d076a97f2836c
SHA2563132f2a734ba7e52d8f9d7a34b17d9b0ecea5a61aad6c60aeafa389ff4f968ad
SHA5120ed9c7f1a64a2266a9d666305f74e379464d23bf595b7c8a36bbe5cc022bb5784b0f84c47b3710f7b8d00cd3c25e82c96230a711808fcf50e5d1595a07bd2185